Hybrid encryption scheme based on temporal ghost imaging

被引:0
|
作者
Kang Yi
Zhang Leihong
Ye Hualong
Zhang Dawei
机构
[1] University of Shanghai for Science and Technology,
来源
Applied Physics B | 2021年 / 127卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In this study, we propose an optical hybrid encryption scheme based on compressive temporal ghost imaging. This scheme combines the asymmetric of the public key cryptography and the non-linear of ghost imaging. First, according to the principle of temporal ghost image encryption, the chaotic modulation pattern is used as the key to encrypt the plaintext information, and then the chaotic pattern is encrypted by the public key cryptography. Then, only the authorized receiver can decrypt the chaotic pattern with the private key. Finally, the plaintext can be decrypted with the compressive sensing algorithm. This scheme solves the problem of key distribution in traditional ghost imaging encryption scheme. At the same time, the application of public key cryptography reduces the cost of establishing private channels and enhances the security of the system. In addition, feasibility, security, and robustness of the scheme were verified by simulation. This scheme has the advantages of high quality, high safety, wide applicability and low cost, which can immediately be applied to encryption.
引用
收藏
相关论文
共 50 条
  • [1] Hybrid encryption scheme based on temporal ghost imaging
    Kang Yi
    Zhang Leihong
    Ye Hualong
    Zhang Dawei
    APPLIED PHYSICS B-LASERS AND OPTICS, 2021, 127 (08):
  • [2] Optical encryption scheme based on ghost imaging with disordered speckles
    Zhang, Yu-dong
    Zhao, Sheng-mei
    CHINESE PHYSICS B, 2017, 26 (05)
  • [3] Optical encryption scheme based on spread spectrum ghost imaging
    Liu, Jin-Fen
    Dong, Yue
    Wang, Le
    Zhao, Sheng-Mei
    CHINESE PHYSICS B, 2023, 32 (07)
  • [4] Optical encryption scheme based on ghost imaging with disordered speckles
    张玉东
    赵生妹
    Chinese Physics B, 2017, 26 (05) : 164 - 168
  • [5] Optical encryption scheme based on spread spectrum ghost imaging
    刘进芬
    董玥
    王乐
    赵生妹
    Chinese Physics B, 2023, 32 (07) : 435 - 441
  • [6] Information Security Scheme Based on Computational Temporal Ghost Imaging
    Jiang, Shan
    Wang, Yurong
    Long, Tao
    Meng, Xiangfeng
    Yang, Xiulun
    Shu, Rong
    Sun, Baoqing
    SCIENTIFIC REPORTS, 2017, 7
  • [7] Information Security Scheme Based on Computational Temporal Ghost Imaging
    Shan Jiang
    Yurong Wang
    Tao Long
    Xiangfeng Meng
    Xiulun Yang
    Rong Shu
    Baoqing Sun
    Scientific Reports, 7
  • [8] Optical encryption scheme with double secret keys based on computational ghost imaging
    Cao F.
    Zhao S.
    Guangxue Xuebao/Acta Optica Sinica, 2017, 37 (01):
  • [9] Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm
    Zhang Leihong
    Wang Yang
    Ye Hualong
    Xu Runchu
    Zhang Dawei
    CURRENT OPTICS AND PHOTONICS, 2021, 5 (06) : 686 - 698
  • [10] Study of an encryption system based on compressive temporal ghost imaging with a chaotic laser
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS COMMUNICATIONS, 2018, 426 : 535 - 540