Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation

被引:40
|
作者
Qin, Yi [1 ]
Zhang, Yingying [2 ]
机构
[1] Nanyang Normal Univ, Coll Mech & Elect Engn, Nanyang 473061, Peoples R China
[2] Nanyang Normal Univ, Coll Phys & Elect Engn, Nanyang 473061, Peoples R China
来源
IEEE PHOTONICS JOURNAL | 2017年 / 9卷 / 02期
基金
中国国家自然科学基金;
关键词
Optical encryption; ghost imaging; exclusive-OR (XOR) operation; OPTICAL ENCRYPTION; QR CODE; AUTHENTICATION; COMPRESSION; RETRIEVAL;
D O I
10.1109/JPHOT.2017.2690314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Information encryption based on the customized data container under the framework of computational ghost imaging
    Liansheng, Sui
    Cong, Du
    Minjie, Xu
    Ailing, Tian
    Anand, Asundi
    OPTICS EXPRESS, 2019, 27 (12) : 16493 - 16506
  • [2] Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container
    Qin, Yi
    Wang, Zhipeng
    Wang, Hongjuan
    Gong, Qiong
    Zhou, Nanrun
    OPTICS AND LASERS IN ENGINEERING, 2018, 105 : 118 - 124
  • [3] Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme
    Li, Xianye
    Meng, Xiangfeng
    Yang, Xiulun
    Wang, Yurong
    Yin, Yongkai
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    OPTICS AND LASERS IN ENGINEERING, 2018, 102 : 106 - 111
  • [4] Encryption of ghost imaging
    Kong, Ling-Jun
    Li, Yongnan
    Qian, Sheng-Xia
    Li, Si-Min
    Tu, Chenghou
    Wang, Hui-Tian
    PHYSICAL REVIEW A, 2013, 88 (01):
  • [5] ENCRYPTION OF OPTICAL INFORMATION USING THE COMPREHENSIVE GHOST IMAGING ALGORITHM
    Zhang Leihong
    Pan Zilan
    Liang Dong
    Zhang Dawei
    Ma Xiuhua
    ELECTRONICS WORLD, 2015, 121 (1949): : 34 - 39
  • [6] Research on a big data information optical double encryption algorithm based on compressive ghost imaging
    Shen Dafu
    Zhan Wenjie
    Zhang Leihong
    LASER PHYSICS LETTERS, 2019, 16 (08)
  • [7] Research on Double-Layers optical information Encryption Based on Ghost Imaging
    Zhang Leihong
    Zhang Zhisheng
    Kang Yi
    Ye Hualong
    Xiong Rui
    Yuan Xiao
    Wang Zhaorui
    Wang Kaimin
    Zhang Dawei
    OPTICS COMMUNICATIONS, 2020, 455
  • [8] Images encryption algorithm based on the quaternion multiplication and the XOR operation
    Mohamed Boussif
    Noureddine Aloui
    Adnene Cherif
    Multimedia Tools and Applications, 2019, 78 : 35493 - 35510
  • [9] Images encryption algorithm based on the quaternion multiplication and the XOR operation
    Boussif, Mohamed
    Aloui, Noureddine
    Cherif, Adnene
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (24) : 35493 - 35510
  • [10] Inverse computational ghost imaging for image encryption
    Zheng, Peixia
    Tan, Qilong
    Liu, Hong-chao
    OPTICS EXPRESS, 2021, 29 (14) : 21290 - 21299