Optical cryptosystem based on computational ghost imaging and nonlinear authentication
We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further...
Gespeichert in:
Veröffentlicht in: | Optics express 2024-01, Vol.32 (3), p.4242-4253 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4253 |
---|---|
container_issue | 3 |
container_start_page | 4242 |
container_title | Optics express |
container_volume | 32 |
creator | Zhang, Lin Wang, Xiaogang Zhou, Qingming Xue, Jidong Xu, Bijun |
description | We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further strengthen the security of the collected secret data, we encrypt it as a series of binary matrices serving as ciphertext. During the authentication key generation, these encoded binary matrices serve as illumination patterns in the CGI system for a non-secret image, which is used as a reference image for authentication. The data captured by the BD is then binarized to generate the authentication key. Upon successful authentication, the receiver obtains the decryption keys. This method achieves both data compression for secret images and enhanced security during information transmission. We validate the feasibility of this method through computer simulations and optical experiments. |
doi_str_mv | 10.1364/OE.510356 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_2921116300</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2921116300</sourcerecordid><originalsourceid>FETCH-LOGICAL-c320t-44ee5cb62d305bb13680d24cf81b41ef32816a4606a6e8b35a3e615aa6ae9a63</originalsourceid><addsrcrecordid>eNpNkDtPwzAURi0EoqUw8AeQRxhS_IqTjKgqD6lSloo1unFu2qDEDrEz9N-TqgUx3TscHek7hNxztuRSq-d8vYw5k7G-IHPOMhUpliaX__4ZufH-izGukiy5JjOZiizRIpuTz7wPjYGWmuHQB-cPPmBHS_BYUWepcV0_BgiNsxOz2zsfaNPBrrE7Crai1tm2sQgDhTHs0R5dR_iWXNXQerw73wXZvq63q_dok799rF42kZGChUgpxNiUWlSSxWU5jUlZJZSpU14qjrUUKdegNNOgMS1lDBI1jwE0YAZaLsjjSdsP7ntEH4qu8QbbFiy60RciE5xzLRmb0KcTagbn_YB10Q_TkuFQcFYcKxb5ujhVnNiHs3YsO6z-yN9s8gdHK229</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2921116300</pqid></control><display><type>article</type><title>Optical cryptosystem based on computational ghost imaging and nonlinear authentication</title><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Zhang, Lin ; Wang, Xiaogang ; Zhou, Qingming ; Xue, Jidong ; Xu, Bijun</creator><creatorcontrib>Zhang, Lin ; Wang, Xiaogang ; Zhou, Qingming ; Xue, Jidong ; Xu, Bijun</creatorcontrib><description>We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further strengthen the security of the collected secret data, we encrypt it as a series of binary matrices serving as ciphertext. During the authentication key generation, these encoded binary matrices serve as illumination patterns in the CGI system for a non-secret image, which is used as a reference image for authentication. The data captured by the BD is then binarized to generate the authentication key. Upon successful authentication, the receiver obtains the decryption keys. This method achieves both data compression for secret images and enhanced security during information transmission. We validate the feasibility of this method through computer simulations and optical experiments.</description><identifier>ISSN: 1094-4087</identifier><identifier>EISSN: 1094-4087</identifier><identifier>DOI: 10.1364/OE.510356</identifier><identifier>PMID: 38297629</identifier><language>eng</language><publisher>United States</publisher><ispartof>Optics express, 2024-01, Vol.32 (3), p.4242-4253</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c320t-44ee5cb62d305bb13680d24cf81b41ef32816a4606a6e8b35a3e615aa6ae9a63</citedby><cites>FETCH-LOGICAL-c320t-44ee5cb62d305bb13680d24cf81b41ef32816a4606a6e8b35a3e615aa6ae9a63</cites><orcidid>0000-0001-9613-203X ; 0000-0003-3297-8081 ; 0009-0003-8329-3143</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,861,27906,27907</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/38297629$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Zhang, Lin</creatorcontrib><creatorcontrib>Wang, Xiaogang</creatorcontrib><creatorcontrib>Zhou, Qingming</creatorcontrib><creatorcontrib>Xue, Jidong</creatorcontrib><creatorcontrib>Xu, Bijun</creatorcontrib><title>Optical cryptosystem based on computational ghost imaging and nonlinear authentication</title><title>Optics express</title><addtitle>Opt Express</addtitle><description>We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further strengthen the security of the collected secret data, we encrypt it as a series of binary matrices serving as ciphertext. During the authentication key generation, these encoded binary matrices serve as illumination patterns in the CGI system for a non-secret image, which is used as a reference image for authentication. The data captured by the BD is then binarized to generate the authentication key. Upon successful authentication, the receiver obtains the decryption keys. This method achieves both data compression for secret images and enhanced security during information transmission. We validate the feasibility of this method through computer simulations and optical experiments.</description><issn>1094-4087</issn><issn>1094-4087</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNpNkDtPwzAURi0EoqUw8AeQRxhS_IqTjKgqD6lSloo1unFu2qDEDrEz9N-TqgUx3TscHek7hNxztuRSq-d8vYw5k7G-IHPOMhUpliaX__4ZufH-izGukiy5JjOZiizRIpuTz7wPjYGWmuHQB-cPPmBHS_BYUWepcV0_BgiNsxOz2zsfaNPBrrE7Crai1tm2sQgDhTHs0R5dR_iWXNXQerw73wXZvq63q_dok799rF42kZGChUgpxNiUWlSSxWU5jUlZJZSpU14qjrUUKdegNNOgMS1lDBI1jwE0YAZaLsjjSdsP7ntEH4qu8QbbFiy60RciE5xzLRmb0KcTagbn_YB10Q_TkuFQcFYcKxb5ujhVnNiHs3YsO6z-yN9s8gdHK229</recordid><startdate>20240129</startdate><enddate>20240129</enddate><creator>Zhang, Lin</creator><creator>Wang, Xiaogang</creator><creator>Zhou, Qingming</creator><creator>Xue, Jidong</creator><creator>Xu, Bijun</creator><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7X8</scope><orcidid>https://orcid.org/0000-0001-9613-203X</orcidid><orcidid>https://orcid.org/0000-0003-3297-8081</orcidid><orcidid>https://orcid.org/0009-0003-8329-3143</orcidid></search><sort><creationdate>20240129</creationdate><title>Optical cryptosystem based on computational ghost imaging and nonlinear authentication</title><author>Zhang, Lin ; Wang, Xiaogang ; Zhou, Qingming ; Xue, Jidong ; Xu, Bijun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c320t-44ee5cb62d305bb13680d24cf81b41ef32816a4606a6e8b35a3e615aa6ae9a63</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Lin</creatorcontrib><creatorcontrib>Wang, Xiaogang</creatorcontrib><creatorcontrib>Zhou, Qingming</creatorcontrib><creatorcontrib>Xue, Jidong</creatorcontrib><creatorcontrib>Xu, Bijun</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>MEDLINE - Academic</collection><jtitle>Optics express</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Lin</au><au>Wang, Xiaogang</au><au>Zhou, Qingming</au><au>Xue, Jidong</au><au>Xu, Bijun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optical cryptosystem based on computational ghost imaging and nonlinear authentication</atitle><jtitle>Optics express</jtitle><addtitle>Opt Express</addtitle><date>2024-01-29</date><risdate>2024</risdate><volume>32</volume><issue>3</issue><spage>4242</spage><epage>4253</epage><pages>4242-4253</pages><issn>1094-4087</issn><eissn>1094-4087</eissn><abstract>We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further strengthen the security of the collected secret data, we encrypt it as a series of binary matrices serving as ciphertext. During the authentication key generation, these encoded binary matrices serve as illumination patterns in the CGI system for a non-secret image, which is used as a reference image for authentication. The data captured by the BD is then binarized to generate the authentication key. Upon successful authentication, the receiver obtains the decryption keys. This method achieves both data compression for secret images and enhanced security during information transmission. We validate the feasibility of this method through computer simulations and optical experiments.</abstract><cop>United States</cop><pmid>38297629</pmid><doi>10.1364/OE.510356</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-9613-203X</orcidid><orcidid>https://orcid.org/0000-0003-3297-8081</orcidid><orcidid>https://orcid.org/0009-0003-8329-3143</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1094-4087 |
ispartof | Optics express, 2024-01, Vol.32 (3), p.4242-4253 |
issn | 1094-4087 1094-4087 |
language | eng |
recordid | cdi_proquest_miscellaneous_2921116300 |
source | DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals |
title | Optical cryptosystem based on computational ghost imaging and nonlinear authentication |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T09%3A55%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optical%20cryptosystem%20based%20on%20computational%20ghost%20imaging%20and%20nonlinear%20authentication&rft.jtitle=Optics%20express&rft.au=Zhang,%20Lin&rft.date=2024-01-29&rft.volume=32&rft.issue=3&rft.spage=4242&rft.epage=4253&rft.pages=4242-4253&rft.issn=1094-4087&rft.eissn=1094-4087&rft_id=info:doi/10.1364/OE.510356&rft_dat=%3Cproquest_cross%3E2921116300%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2921116300&rft_id=info:pmid/38297629&rfr_iscdi=true |