Image security using steganography and cryptography with sweeping computational ghost imaging

被引:1
|
作者
Rajabi-Ghaleh, Sajjad [1 ,2 ,3 ]
Olyaeefar, Babak [1 ,2 ]
Kheradmand, Reza [1 ,2 ,3 ]
Ahmadi-Kandjani, Sohrab [1 ,2 ,3 ]
机构
[1] Univ Tabriz, Res Inst Appl Phys & Astron, Tabriz, Iran
[2] Univ Tabriz, Ctr Photon Excellence, Tabriz, Iran
[3] Univ Tabriz, Fac Phys, Tabriz, Iran
关键词
encryption; correlation coefficient; cryptography; NPCR; NRMS; RSA; steganography; sweeping computational ghost imaging;
D O I
10.3389/fphy.2024.1336485
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A sweeping computational ghost imaging (SCGI)-based encryption system is intended for increased data security and speedier data transport. SCGI is combined with steganography and cryptography processes in this system. SCGI requires fewer shots, resulting in faster image capture, transmission, encryption, and decryption. This strategy also results in smaller, more compact data packages and higher bitrates. Least significant bit (LSB) uses steganography to conceal the hidden picture. In the case of Rivest-Shamir-Adleman (RSA) encryption, public and private keys are generated via a one-way function based on bucket values. Encryption is performed on two levels, with an asymmetric approach divided into three sub-items that significantly increase encryption. Surprisingly, the method uses fewer pictures for image reconstruction, resulting in faster image reconstruction. SCGI promises applications in an extensive number of data encryption sectors since this technology leads to smaller data packages and higher bitrates. The presented approach is examined using the number of pixel change rate (NPCR), normalized root mean square (NRMS), peak signal-to-noise ratio (PSNR), and correlation coefficient (CC), which indicates constant encryption improvement. We experimentally and situationally demonstrate our findings under eavesdropping, which prove the resistance and robustness of our methods. In optimal settings, this innovation enhances encryption by up to 90% when compared to traditional encryption methods.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
    Gladwin, S. Joseph
    Gowthami, Pasumarthi Lakshmi
    2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SIGNAL PROCESSING (AISP), 2020,
  • [42] Recent advances in multimedia information security: cryptography and steganography
    Multimedia Tools and Applications, 2023, 82 : 21865 - 21865
  • [43] The improved method of interpolation computational ghost imaging in computational ghost imaging
    Liu, Yujian
    Yuan, Heng
    Yang, Zhaohua
    Li, Guanghan
    Sun, Yuzhe
    FIFTH SYMPOSIUM ON NOVEL OPTOELECTRONIC DETECTION TECHNOLOGY AND APPLICATION, 2019, 11023
  • [44] Fluorescence microscope by using computational ghost imaging
    Mizutani, Yasuhiro
    Shibuya, Kyuki
    Iwata, Tetsuo
    Takaya, Yasuhiro
    INTERNATIONAL SYMPOSIUM OF OPTOMECHATRONICS TECHNOLOGY (ISOT 2015), 2015, 32
  • [45] A Survey on Cloud Data Security using Image Steganography
    Albalawi, Afrah
    Hamza, Nermin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 645 - 649
  • [46] Computational ghost imaging using deep learning
    Shimobaba, Tomoyoshi
    Endo, Yutaka
    Nishitsuji, Takashi
    Takahashi, Takayuki
    Nagahama, Yuki
    Hasegawa, Satoki
    Sano, Marie
    Hirayama, Ryuji
    Kakue, Takashi
    Shiraki, Atsushi
    Ito, Tomoyoshi
    OPTICS COMMUNICATIONS, 2018, 413 : 147 - 151
  • [47] Computational ghost imaging with key-patterns for image encryption
    Xu, Chenxiang
    Li, Dekui
    Guo, Kai
    Yin, Zhiping
    Guo, Zhongyi
    OPTICS COMMUNICATIONS, 2023, 537
  • [48] Optical image authentication and encryption scheme with computational ghost imaging
    Hu, Jie-Long
    Chen, Ming-Xuan
    Zhou, Shun
    Zhou, Nan-Run
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (17):
  • [49] Optimized Reconstruction of Computational Ghost Imaging Based on Image Fusion
    Deng Chao
    Gao Chao
    Wang Xiaogian
    Yao Zhihai
    LASER & OPTOELECTRONICS PROGRESS, 2023, 60 (20)
  • [50] Optical image encryption and authentication scheme with computational ghost imaging
    Guo, Zhe
    Chen, Su-Hua
    Zhou, Ling
    Gong, Li-Hua
    APPLIED MATHEMATICAL MODELLING, 2024, 131 : 49 - 66