Hybrid encryption scheme based on temporal ghost imaging

被引:0
|
作者
Kang Yi
Zhang Leihong
Ye Hualong
Zhang Dawei
机构
[1] University of Shanghai for Science and Technology,
来源
Applied Physics B | 2021年 / 127卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In this study, we propose an optical hybrid encryption scheme based on compressive temporal ghost imaging. This scheme combines the asymmetric of the public key cryptography and the non-linear of ghost imaging. First, according to the principle of temporal ghost image encryption, the chaotic modulation pattern is used as the key to encrypt the plaintext information, and then the chaotic pattern is encrypted by the public key cryptography. Then, only the authorized receiver can decrypt the chaotic pattern with the private key. Finally, the plaintext can be decrypted with the compressive sensing algorithm. This scheme solves the problem of key distribution in traditional ghost imaging encryption scheme. At the same time, the application of public key cryptography reduces the cost of establishing private channels and enhances the security of the system. In addition, feasibility, security, and robustness of the scheme were verified by simulation. This scheme has the advantages of high quality, high safety, wide applicability and low cost, which can immediately be applied to encryption.
引用
收藏
相关论文
共 50 条
  • [31] A New Encryption Scheme based on Hybrid Problems
    Sahu, Hemlal
    Sharma, B. K.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 524 - 527
  • [32] A HYBRID ENCRYPTION SCHEME BASED ON THE SATISFIABILITY PROBLEM
    Sun, Rui
    Peng, Qiao
    Tian, Youliang
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 1363 - 1367
  • [33] Forgery attack on optical encryption based on computational ghost imaging
    Yuan, Sheng
    Wang, Lanjie
    Liu, Xuemei
    Zhou, Xin
    OPTICS LETTERS, 2020, 45 (14) : 3913 - 3916
  • [34] Temporal ghost imaging
    Daniele Faccio
    Nature Photonics, 2016, 10 (3) : 150 - 152
  • [35] Computational ghost imaging encryption based on fingerprint phase mask
    Zhu, Jinan
    Yang, Xiulun
    Meng, Xiangfeng
    Wang, Yurong
    Yin, Yongkai
    Sun, Xiaowen
    Dong, Guoyan
    OPTICS COMMUNICATIONS, 2018, 420 : 34 - 39
  • [36] Optical encryption based on ghost imaging and public key cryptography
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS AND LASERS IN ENGINEERING, 2018, 111 : 58 - 64
  • [37] Research on multiple-image encryption scheme based on joint power spectral division multiplexing and ghost imaging
    Wang, Yang
    Zhang, Leihong
    Zhang, Dawei
    Wang, Kaimin
    LASER PHYSICS, 2021, 31 (05)
  • [38] A crosstalk-free multiple-image encryption scheme based on computational ghost imaging with binarized detection
    Bai, Xing
    Yuan, Sheng
    Yu, Zhan
    Wang, Yujie
    Chen, Xingyu
    Liu, Yang
    Sun, Mingze
    Li, Xinjia
    Zhou, Xin
    LASER PHYSICS, 2024, 34 (08)
  • [39] Temporal ghost imaging
    Kuusela, Tom A.
    EUROPEAN JOURNAL OF PHYSICS, 2017, 38 (03)
  • [40] Mask-based denoising scheme for ghost imaging
    周阳
    郭树旭
    钟菲
    张天
    Chinese Physics B, 2019, 28 (08) : 152 - 159