Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation

被引:40
|
作者
Qin, Yi [1 ]
Zhang, Yingying [2 ]
机构
[1] Nanyang Normal Univ, Coll Mech & Elect Engn, Nanyang 473061, Peoples R China
[2] Nanyang Normal Univ, Coll Phys & Elect Engn, Nanyang 473061, Peoples R China
来源
IEEE PHOTONICS JOURNAL | 2017年 / 9卷 / 02期
基金
中国国家自然科学基金;
关键词
Optical encryption; ghost imaging; exclusive-OR (XOR) operation; OPTICAL ENCRYPTION; QR CODE; AUTHENTICATION; COMPRESSION; RETRIEVAL;
D O I
10.1109/JPHOT.2017.2690314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Optical encryption scheme based on ghost imaging with disordered speckles
    Zhang, Yu-dong
    Zhao, Sheng-mei
    CHINESE PHYSICS B, 2017, 26 (05)
  • [32] Computational ghost imaging encryption based on fingerprint phase mask
    Zhu, Jinan
    Yang, Xiulun
    Meng, Xiangfeng
    Wang, Yurong
    Yin, Yongkai
    Sun, Xiaowen
    Dong, Guoyan
    OPTICS COMMUNICATIONS, 2018, 420 : 34 - 39
  • [33] Optical encryption based on ghost imaging and public key cryptography
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS AND LASERS IN ENGINEERING, 2018, 111 : 58 - 64
  • [34] Optical encryption scheme based on spread spectrum ghost imaging
    刘进芬
    董玥
    王乐
    赵生妹
    Chinese Physics B, 2023, 32 (07) : 435 - 441
  • [35] A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation
    Ahmad, Jawad
    Khan, Muazzam Ali
    Ahmed, Fawad
    Khan, Jan Sher
    NEURAL COMPUTING & APPLICATIONS, 2018, 30 (12): : 3847 - 3857
  • [36] Secure patients data transmission using XOR ciphering encryption and ECG steganography
    Patel, Shaheen S.
    Sankpal, S. V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1311 - 1315
  • [37] Comparative Study of AES, RSA, Genetic, Affine Transform with XOR Operation, And Watermarking for Image Encryption
    Ray, Avinash
    Potnis, Anjali
    Dwivedy, Prashant
    Soofi, Shahbaz
    Bhade, Uday
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 274 - 278
  • [38] A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation
    Jawad Ahmad
    Muazzam Ali Khan
    Fawad Ahmed
    Jan Sher Khan
    Neural Computing and Applications, 2018, 30 : 3847 - 3857
  • [39] An optical image encryption based on computational ghost imaging with sparse reconstruction
    Sui, Liansheng
    Pang, Zhi
    Cheng, Ying
    Cheng, Yin
    Xiao, Zhaolin
    Tian, Ailing
    Qian, Kemao
    Anand, Asundi
    OPTICS AND LASERS IN ENGINEERING, 2021, 143 (143)
  • [40] Research on Double Encryption of Ghost Imaging by SegNet Deep Neural Network
    Ye, Hualong
    Guo, Daidou
    IEEE PHOTONICS TECHNOLOGY LETTERS, 2024, 36 (10) : 669 - 672