Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation

被引:40
|
作者
Qin, Yi [1 ]
Zhang, Yingying [2 ]
机构
[1] Nanyang Normal Univ, Coll Mech & Elect Engn, Nanyang 473061, Peoples R China
[2] Nanyang Normal Univ, Coll Phys & Elect Engn, Nanyang 473061, Peoples R China
来源
IEEE PHOTONICS JOURNAL | 2017年 / 9卷 / 02期
基金
中国国家自然科学基金;
关键词
Optical encryption; ghost imaging; exclusive-OR (XOR) operation; OPTICAL ENCRYPTION; QR CODE; AUTHENTICATION; COMPRESSION; RETRIEVAL;
D O I
10.1109/JPHOT.2017.2690314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Hybrid encryption scheme based on temporal ghost imaging
    Kang Yi
    Zhang Leihong
    Ye Hualong
    Zhang Dawei
    Applied Physics B, 2021, 127
  • [22] On Ghost Imaging Studies for Information Optical Imaging
    Hu, Chenyu
    Han, Shensheng
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [23] Mutual information of ghost imaging systems
    Li, E. (ler@siom.ac.cn), 1600, Chinese Optical Society (33):
  • [24] Computational ghost imaging with key-patterns for image encryption
    Xu, Chenxiang
    Li, Dekui
    Guo, Kai
    Yin, Zhiping
    Guo, Zhongyi
    OPTICS COMMUNICATIONS, 2023, 537
  • [25] Multiple-image encryption based on computational ghost imaging
    Wu, Jingjing
    Xie, Zhenwei
    Liu, Zhengjun
    Liu, Wei
    Zhang, Yan
    Liu, Shutian
    OPTICS COMMUNICATIONS, 2016, 359 : 38 - 43
  • [26] Optical encryption scheme based on spread spectrum ghost imaging
    Liu, Jin-Fen
    Dong, Yue
    Wang, Le
    Zhao, Sheng-Mei
    CHINESE PHYSICS B, 2023, 32 (07)
  • [27] Optical image authentication and encryption scheme with computational ghost imaging
    Hu, Jie-Long
    Chen, Ming-Xuan
    Zhou, Shun
    Zhou, Nan-Run
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (17):
  • [28] Optical encryption scheme based on ghost imaging with disordered speckles
    张玉东
    赵生妹
    Chinese Physics B, 2017, 26 (05) : 164 - 168
  • [29] Optical image encryption and authentication scheme with computational ghost imaging
    Guo, Zhe
    Chen, Su-Hua
    Zhou, Ling
    Gong, Li-Hua
    APPLIED MATHEMATICAL MODELLING, 2024, 131 : 49 - 66
  • [30] Forgery attack on optical encryption based on computational ghost imaging
    Yuan, Sheng
    Wang, Lanjie
    Liu, Xuemei
    Zhou, Xin
    OPTICS LETTERS, 2020, 45 (14) : 3913 - 3916