Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/106846
Title: | Information encryption based on the customized data container under the framework of computational ghost imaging | Authors: | Sui, Liansheng Du, Cong Xu, Minjie Tian, Ailing Asundi, Anand |
Keywords: | Engineering::Mechanical engineering Ghost Imaging Phase Retrieval |
Issue Date: | 2019 | Source: | Sui, L., Du, C., Xu, M., Tian, A., & Asundi, A. (2019). Information encryption based on the customized data container under the framework of computational ghost imaging. Optics Express, 27(12), 16493-16506. doi:10.1364/OE.27.016493 | Series/Report no.: | Optics Express | Abstract: | In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues caused by the inherent linearity and mechanism of computational ghost imaging. First, the primary information to be encrypted is transformed into the bits of information, which is used to control the formation of the customized data container. Then, the exclusive-OR (XOR) operation is performed on it with a randomly generated data container, and the XOR encoding result is scrambled based on the random sequence engendered with the logistic map so that the linearity of the cryptosystem is destroyed. Second, instead of using random phase-only masks, a number of phase masks retrieved from 2D patterns derived from the rows of the designed Hadamard matrix are used to record the measured intensities. The redundancy between these phase masks is low, which can reduce the number of the required phase-only masks greatly. Meanwhile, the conditions of the logistic map are considered as the secret keys, which can enhance the security level greatly due to their high sensitivity to tiny variation. The validity and feasibility of the proposed method have been demonstrated with a set of numerical simulations. | URI: | https://hdl.handle.net/10356/106846 http://hdl.handle.net/10220/49660 |
ISSN: | 1094-4087 | DOI: | 10.1364/OE.27.016493 | Rights: | © 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement. Users may use, reuse, and build upon the article, or use the article for text or data mining, so long as such uses are for non-commercial purposes and appropriate attribution is maintained. All other rights are reserved. | Fulltext Permission: | open | Fulltext Availability: | With Fulltext |
Appears in Collections: | MAE Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Information encryption based on the customized data container under the framework of computational ghost imaging.pdf | 3.29 MB | Adobe PDF | ![]() View/Open |
SCOPUSTM
Citations
10
43
Updated on Jan 30, 2023
Web of ScienceTM
Citations
10
41
Updated on Feb 1, 2023
Page view(s)
208
Updated on Feb 3, 2023
Download(s) 50
82
Updated on Feb 3, 2023
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.