Optical cryptosystem based on computational ghost imaging and nonlinear authentication

We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Optics express 2024-01, Vol.32 (3), p.4242-4253
Hauptverfasser: Zhang, Lin, Wang, Xiaogang, Zhou, Qingming, Xue, Jidong, Xu, Bijun
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4253
container_issue 3
container_start_page 4242
container_title Optics express
container_volume 32
creator Zhang, Lin
Wang, Xiaogang
Zhou, Qingming
Xue, Jidong
Xu, Bijun
description We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further strengthen the security of the collected secret data, we encrypt it as a series of binary matrices serving as ciphertext. During the authentication key generation, these encoded binary matrices serve as illumination patterns in the CGI system for a non-secret image, which is used as a reference image for authentication. The data captured by the BD is then binarized to generate the authentication key. Upon successful authentication, the receiver obtains the decryption keys. This method achieves both data compression for secret images and enhanced security during information transmission. We validate the feasibility of this method through computer simulations and optical experiments.
doi_str_mv 10.1364/OE.510356
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_2921116300</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2921116300</sourcerecordid><originalsourceid>FETCH-LOGICAL-c320t-44ee5cb62d305bb13680d24cf81b41ef32816a4606a6e8b35a3e615aa6ae9a63</originalsourceid><addsrcrecordid>eNpNkDtPwzAURi0EoqUw8AeQRxhS_IqTjKgqD6lSloo1unFu2qDEDrEz9N-TqgUx3TscHek7hNxztuRSq-d8vYw5k7G-IHPOMhUpliaX__4ZufH-izGukiy5JjOZiizRIpuTz7wPjYGWmuHQB-cPPmBHS_BYUWepcV0_BgiNsxOz2zsfaNPBrrE7Crai1tm2sQgDhTHs0R5dR_iWXNXQerw73wXZvq63q_dok799rF42kZGChUgpxNiUWlSSxWU5jUlZJZSpU14qjrUUKdegNNOgMS1lDBI1jwE0YAZaLsjjSdsP7ntEH4qu8QbbFiy60RciE5xzLRmb0KcTagbn_YB10Q_TkuFQcFYcKxb5ujhVnNiHs3YsO6z-yN9s8gdHK229</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2921116300</pqid></control><display><type>article</type><title>Optical cryptosystem based on computational ghost imaging and nonlinear authentication</title><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Zhang, Lin ; Wang, Xiaogang ; Zhou, Qingming ; Xue, Jidong ; Xu, Bijun</creator><creatorcontrib>Zhang, Lin ; Wang, Xiaogang ; Zhou, Qingming ; Xue, Jidong ; Xu, Bijun</creatorcontrib><description>We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further strengthen the security of the collected secret data, we encrypt it as a series of binary matrices serving as ciphertext. During the authentication key generation, these encoded binary matrices serve as illumination patterns in the CGI system for a non-secret image, which is used as a reference image for authentication. The data captured by the BD is then binarized to generate the authentication key. Upon successful authentication, the receiver obtains the decryption keys. This method achieves both data compression for secret images and enhanced security during information transmission. We validate the feasibility of this method through computer simulations and optical experiments.</description><identifier>ISSN: 1094-4087</identifier><identifier>EISSN: 1094-4087</identifier><identifier>DOI: 10.1364/OE.510356</identifier><identifier>PMID: 38297629</identifier><language>eng</language><publisher>United States</publisher><ispartof>Optics express, 2024-01, Vol.32 (3), p.4242-4253</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c320t-44ee5cb62d305bb13680d24cf81b41ef32816a4606a6e8b35a3e615aa6ae9a63</citedby><cites>FETCH-LOGICAL-c320t-44ee5cb62d305bb13680d24cf81b41ef32816a4606a6e8b35a3e615aa6ae9a63</cites><orcidid>0000-0001-9613-203X ; 0000-0003-3297-8081 ; 0009-0003-8329-3143</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,861,27906,27907</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/38297629$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Zhang, Lin</creatorcontrib><creatorcontrib>Wang, Xiaogang</creatorcontrib><creatorcontrib>Zhou, Qingming</creatorcontrib><creatorcontrib>Xue, Jidong</creatorcontrib><creatorcontrib>Xu, Bijun</creatorcontrib><title>Optical cryptosystem based on computational ghost imaging and nonlinear authentication</title><title>Optics express</title><addtitle>Opt Express</addtitle><description>We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further strengthen the security of the collected secret data, we encrypt it as a series of binary matrices serving as ciphertext. During the authentication key generation, these encoded binary matrices serve as illumination patterns in the CGI system for a non-secret image, which is used as a reference image for authentication. The data captured by the BD is then binarized to generate the authentication key. Upon successful authentication, the receiver obtains the decryption keys. This method achieves both data compression for secret images and enhanced security during information transmission. We validate the feasibility of this method through computer simulations and optical experiments.</description><issn>1094-4087</issn><issn>1094-4087</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNpNkDtPwzAURi0EoqUw8AeQRxhS_IqTjKgqD6lSloo1unFu2qDEDrEz9N-TqgUx3TscHek7hNxztuRSq-d8vYw5k7G-IHPOMhUpliaX__4ZufH-izGukiy5JjOZiizRIpuTz7wPjYGWmuHQB-cPPmBHS_BYUWepcV0_BgiNsxOz2zsfaNPBrrE7Crai1tm2sQgDhTHs0R5dR_iWXNXQerw73wXZvq63q_dok799rF42kZGChUgpxNiUWlSSxWU5jUlZJZSpU14qjrUUKdegNNOgMS1lDBI1jwE0YAZaLsjjSdsP7ntEH4qu8QbbFiy60RciE5xzLRmb0KcTagbn_YB10Q_TkuFQcFYcKxb5ujhVnNiHs3YsO6z-yN9s8gdHK229</recordid><startdate>20240129</startdate><enddate>20240129</enddate><creator>Zhang, Lin</creator><creator>Wang, Xiaogang</creator><creator>Zhou, Qingming</creator><creator>Xue, Jidong</creator><creator>Xu, Bijun</creator><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope><orcidid>https://orcid.org/0000-0001-9613-203X</orcidid><orcidid>https://orcid.org/0000-0003-3297-8081</orcidid><orcidid>https://orcid.org/0009-0003-8329-3143</orcidid></search><sort><creationdate>20240129</creationdate><title>Optical cryptosystem based on computational ghost imaging and nonlinear authentication</title><author>Zhang, Lin ; Wang, Xiaogang ; Zhou, Qingming ; Xue, Jidong ; Xu, Bijun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c320t-44ee5cb62d305bb13680d24cf81b41ef32816a4606a6e8b35a3e615aa6ae9a63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Lin</creatorcontrib><creatorcontrib>Wang, Xiaogang</creatorcontrib><creatorcontrib>Zhou, Qingming</creatorcontrib><creatorcontrib>Xue, Jidong</creatorcontrib><creatorcontrib>Xu, Bijun</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><jtitle>Optics express</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Lin</au><au>Wang, Xiaogang</au><au>Zhou, Qingming</au><au>Xue, Jidong</au><au>Xu, Bijun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optical cryptosystem based on computational ghost imaging and nonlinear authentication</atitle><jtitle>Optics express</jtitle><addtitle>Opt Express</addtitle><date>2024-01-29</date><risdate>2024</risdate><volume>32</volume><issue>3</issue><spage>4242</spage><epage>4253</epage><pages>4242-4253</pages><issn>1094-4087</issn><eissn>1094-4087</eissn><abstract>We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further strengthen the security of the collected secret data, we encrypt it as a series of binary matrices serving as ciphertext. During the authentication key generation, these encoded binary matrices serve as illumination patterns in the CGI system for a non-secret image, which is used as a reference image for authentication. The data captured by the BD is then binarized to generate the authentication key. Upon successful authentication, the receiver obtains the decryption keys. This method achieves both data compression for secret images and enhanced security during information transmission. We validate the feasibility of this method through computer simulations and optical experiments.</abstract><cop>United States</cop><pmid>38297629</pmid><doi>10.1364/OE.510356</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-9613-203X</orcidid><orcidid>https://orcid.org/0000-0003-3297-8081</orcidid><orcidid>https://orcid.org/0009-0003-8329-3143</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1094-4087
ispartof Optics express, 2024-01, Vol.32 (3), p.4242-4253
issn 1094-4087
1094-4087
language eng
recordid cdi_proquest_miscellaneous_2921116300
source DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals
title Optical cryptosystem based on computational ghost imaging and nonlinear authentication
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T09%3A55%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optical%20cryptosystem%20based%20on%20computational%20ghost%20imaging%20and%20nonlinear%20authentication&rft.jtitle=Optics%20express&rft.au=Zhang,%20Lin&rft.date=2024-01-29&rft.volume=32&rft.issue=3&rft.spage=4242&rft.epage=4253&rft.pages=4242-4253&rft.issn=1094-4087&rft.eissn=1094-4087&rft_id=info:doi/10.1364/OE.510356&rft_dat=%3Cproquest_cross%3E2921116300%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2921116300&rft_id=info:pmid/38297629&rfr_iscdi=true