Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation

被引:5
|
作者
Yuan, Sheng [1 ]
Han, Yakun [1 ]
Liu, Xuemei [1 ]
Li, Zhongyang [1 ]
Bing, Pibin [1 ]
Zhou, Xin [2 ]
机构
[1] North China Univ Water Resources & Elect Power, Dept Elect Engn, Zhengzhou 450046, Peoples R China
[2] Sichuan Univ, Dept Opto Elect Sci & Technol, Chengdu 610065, Peoples R China
来源
OPTIK | 2023年 / 273卷
基金
中国国家自然科学基金;
关键词
Computational ghost imaging; Optical encryption; Hadamard matrix; CHOSEN-PLAINTEXT ATTACK; CIPHERTEXT-ONLY ATTACK; PHASE; VULNERABILITY; SCHEME;
D O I
10.1016/j.ijleo.2022.170500
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In multi-user applications, one of the thorny problems for a cryptographic algorithm is how to distribute the keys and reduce the amount of transmitted data without crosstalk and security risks. Based on Hadamard modulated Computational Ghost Imaging (CGI), we propose an optical encryption scheme for multi-user, in which a common ciphertext is public for all users and one user owns a unique key to index the row sequence of Hadamard basis for decryption. Therefore, the channel resources are saved because the ciphertext does not need to be transmitted. Compared with the conventional CGI-based random intensity modulation encryption, the scheme not only reduces the amount of transmitted key data but also enhances the quality of decrypted images, which benefits from the order of Hadamard basis rather than its distribution being taken as the key. Theoretical analysis and numerical simulations are conducted to prove the feasibility and property of the scheme.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Computational temporal ghost imaging based on complementary modulation
    李佳炜
    张伟
    刘雪峰
    姚旭日
    Chinese Physics B, 2024, 33 (11) : 324 - 329
  • [22] Computational temporal ghost imaging based on complementary modulation
    Li, Jia-Wei
    Zhang, Wei
    Liu, Xue-Feng
    Yao, Xu-Ri
    CHINESE PHYSICS B, 2024, 33 (11)
  • [23] Inverse computational ghost imaging for image encryption
    Zheng, Peixia
    Tan, Qilong
    Liu, Hong-chao
    OPTICS EXPRESS, 2021, 29 (14) : 21290 - 21299
  • [24] High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique
    Zhao, Shengmei
    Wang, Le
    Liang, Wenqiang
    Cheng, Weiwen
    Gong, Longyan
    OPTICS COMMUNICATIONS, 2015, 353 : 90 - 95
  • [25] Optical encryption scheme based on spread spectrum ghost imaging
    Liu, Jin-Fen
    Dong, Yue
    Wang, Le
    Zhao, Sheng-Mei
    CHINESE PHYSICS B, 2023, 32 (07)
  • [26] Optical encryption scheme based on ghost imaging with disordered speckles
    张玉东
    赵生妹
    Chinese Physics B, 2017, 26 (05) : 164 - 168
  • [27] Optical encryption scheme based on ghost imaging with disordered speckles
    Zhang, Yu-dong
    Zhao, Sheng-mei
    CHINESE PHYSICS B, 2017, 26 (05)
  • [28] Secure and Scalable Multi-User Searchable Encryption
    Van Rompay, Cedric
    Molva, Refik
    Onen, Melek
    SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2018, : 15 - 25
  • [29] A Revocable Certificateless Encryption Scheme for Multi-User
    Mou, Yiming
    Deng, Lunzhi
    Ruan, Yu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (01):
  • [30] Hybrid Encryption in a Multi-user Setting, Revisited
    Giacon, Federico
    Kiltz, Eike
    Poettering, Bertram
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 159 - 189