Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation

被引:5
|
作者
Yuan, Sheng [1 ]
Han, Yakun [1 ]
Liu, Xuemei [1 ]
Li, Zhongyang [1 ]
Bing, Pibin [1 ]
Zhou, Xin [2 ]
机构
[1] North China Univ Water Resources & Elect Power, Dept Elect Engn, Zhengzhou 450046, Peoples R China
[2] Sichuan Univ, Dept Opto Elect Sci & Technol, Chengdu 610065, Peoples R China
来源
OPTIK | 2023年 / 273卷
基金
中国国家自然科学基金;
关键词
Computational ghost imaging; Optical encryption; Hadamard matrix; CHOSEN-PLAINTEXT ATTACK; CIPHERTEXT-ONLY ATTACK; PHASE; VULNERABILITY; SCHEME;
D O I
10.1016/j.ijleo.2022.170500
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In multi-user applications, one of the thorny problems for a cryptographic algorithm is how to distribute the keys and reduce the amount of transmitted data without crosstalk and security risks. Based on Hadamard modulated Computational Ghost Imaging (CGI), we propose an optical encryption scheme for multi-user, in which a common ciphertext is public for all users and one user owns a unique key to index the row sequence of Hadamard basis for decryption. Therefore, the channel resources are saved because the ciphertext does not need to be transmitted. Compared with the conventional CGI-based random intensity modulation encryption, the scheme not only reduces the amount of transmitted key data but also enhances the quality of decrypted images, which benefits from the order of Hadamard basis rather than its distribution being taken as the key. Theoretical analysis and numerical simulations are conducted to prove the feasibility and property of the scheme.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Optical encryption based on ghost imaging and public key cryptography
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS AND LASERS IN ENGINEERING, 2018, 111 : 58 - 64
  • [32] Optical encryption scheme based on spread spectrum ghost imaging
    刘进芬
    董玥
    王乐
    赵生妹
    Chinese Physics B, 2023, (07) : 435 - 441
  • [33] Multi-user searchable encryption with a designated server
    Li, Zhen
    Zhao, Minghao
    Jiang, Han
    Xu, Qiuliang
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) : 617 - 629
  • [34] Multi-user searchable encryption with a designated server
    Zhen Li
    Minghao Zhao
    Han Jiang
    Qiuliang Xu
    Annals of Telecommunications, 2017, 72 : 617 - 629
  • [35] Optical image hiding based on computational ghost imaging
    Wang, Le
    Zhao, Shengmei
    Cheng, Weiwen
    Gong, Longyan
    Chen, Hanwu
    OPTICS COMMUNICATIONS, 2016, 366 : 314 - 320
  • [36] A multi-user MIMO system encryption algorithm based on artificial noise
    Zhao, Jia-Jie
    Peng, Jian-Hua
    Huang, Kai-Zhi
    Ji, Jiang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (08): : 1939 - 1943
  • [37] A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
    Wei, Zhang
    INTERNATIONAL JOURNAL OF TECHNOLOGY AND HUMAN INTERACTION, 2016, 12 (02) : 72 - 82
  • [38] A Multi-User Encryption and Authentication System Based on Joint Transform Correlation
    Zhao, Tieyu
    Chi, Yingying
    ENTROPY, 2019, 21 (09)
  • [39] Multi-User Encrypted Machine Learning Based on Partially Homomorphic Encryption
    Xie, Shaoxiong
    Ye, Jun
    Ou, Wei
    ELECTRONICS, 2025, 14 (03):
  • [40] Optical correlator-based computational ghost imaging towards high-speed computational ghost imaging
    Inoue, Ayano
    Usami, Ren
    Saito, Keisuke
    Honda, Yasunobu
    Ikeda, Kanami
    Watanabe, Eriko
    JAPANESE JOURNAL OF APPLIED PHYSICS, 2019, 58 (SK)