Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation

被引:40
|
作者
Qin, Yi [1 ]
Zhang, Yingying [2 ]
机构
[1] Nanyang Normal Univ, Coll Mech & Elect Engn, Nanyang 473061, Peoples R China
[2] Nanyang Normal Univ, Coll Phys & Elect Engn, Nanyang 473061, Peoples R China
来源
IEEE PHOTONICS JOURNAL | 2017年 / 9卷 / 02期
基金
中国国家自然科学基金;
关键词
Optical encryption; ghost imaging; exclusive-OR (XOR) operation; OPTICAL ENCRYPTION; QR CODE; AUTHENTICATION; COMPRESSION; RETRIEVAL;
D O I
10.1109/JPHOT.2017.2690314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Secure optical encryption based on ghost imaging with fractional Fourier transform
    Zhao, Shengmei
    Yu, Xiaodi
    Wang, Le
    Li, Wei
    Zheng, Baoyu
    OPTICS COMMUNICATIONS, 2020, 474
  • [42] Super-Encryption Implementation Using Monoalphabetic Algorithm and XOR Algorithm for Data Security
    Rachmawati, Dian
    Budiman, Mohammad Andri
    Aulia, Indra
    2ND INTERNATIONAL CONFERENCE ON SCIENCE (ICOS), 2018, 979
  • [43] One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access
    Kang, Yi
    Zhang, Leihong
    Ye, Hualong
    Zhao, Mantong
    Kanwal, Saima
    Bai, Chunyan
    Zhang, Dawei
    PHOTONICS RESEARCH, 2019, 7 (12) : 1370 - 1380
  • [44] One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access
    YI KANG
    LEIHONG ZHANG
    HUALONG YE
    MANTONG ZHAO
    SAIMA KANWAL
    CHUNYAN BAI
    DAWEI ZHANG
    Photonics Research, 2019, 7 (12) : 1370 - 1380
  • [45] One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access
    YI KANG
    LEIHONG ZHANG
    HUALONG YE
    MANTONG ZHAO
    SAIMA KANWAL
    CHUNYAN BAI
    DAWEI ZHANG
    Photonics Research, 2019, (12) : 1370 - 1380
  • [46] Optical encryption scheme with double secret keys based on computational ghost imaging
    Cao F.
    Zhao S.
    Guangxue Xuebao/Acta Optica Sinica, 2017, 37 (01):
  • [47] Gray-scale and color optical encryption based on computational ghost imaging
    Tanha, Mehrdad
    Kheradmand, Reza
    Ahmadi-Kandjani, Sohrab
    APPLIED PHYSICS LETTERS, 2012, 101 (10)
  • [48] Multiple layer encryption and steganography via multi-channel ghost imaging
    Ghanbari-Ghalehjoughi, Hossein
    Eslami, Mansour
    Ahmadi-Kandjani, Sohrab
    Ghanbari-Ghalehjoughi, Mohsen
    Yu, Zeyun
    OPTICS AND LASERS IN ENGINEERING, 2020, 134
  • [49] Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling
    Li, Xianye
    Meng, Xiangfeng
    Yang, Xiulun
    Yin, Yongkai
    Wang, Yurong
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    IEEE PHOTONICS JOURNAL, 2016, 8 (04):
  • [50] Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm
    Zhang Leihong
    Wang Yang
    Ye Hualong
    Xu Runchu
    Zhang Dawei
    CURRENT OPTICS AND PHOTONICS, 2021, 5 (06) : 686 - 698