Information encryption based on the customized data container under the framework of computational ghost imaging

In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues cau...

Full description

Saved in:
Bibliographic Details
Main Authors: Sui, Liansheng, Du, Cong, Xu, Minjie, Tian, Ailing, Asundi, Anand
Other Authors: School of Mechanical and Aerospace Engineering
Format: Article
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/106846
http://hdl.handle.net/10220/49660
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues caused by the inherent linearity and mechanism of computational ghost imaging. First, the primary information to be encrypted is transformed into the bits of information, which is used to control the formation of the customized data container. Then, the exclusive-OR (XOR) operation is performed on it with a randomly generated data container, and the XOR encoding result is scrambled based on the random sequence engendered with the logistic map so that the linearity of the cryptosystem is destroyed. Second, instead of using random phase-only masks, a number of phase masks retrieved from 2D patterns derived from the rows of the designed Hadamard matrix are used to record the measured intensities. The redundancy between these phase masks is low, which can reduce the number of the required phase-only masks greatly. Meanwhile, the conditions of the logistic map are considered as the secret keys, which can enhance the security level greatly due to their high sensitivity to tiny variation. The validity and feasibility of the proposed method have been demonstrated with a set of numerical simulations.