Information encryption based on the customized data container under the framework of computational ghost imaging
In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues cau...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/106846 http://hdl.handle.net/10220/49660 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-106846 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1068462023-03-04T17:21:45Z Information encryption based on the customized data container under the framework of computational ghost imaging Sui, Liansheng Du, Cong Xu, Minjie Tian, Ailing Asundi, Anand School of Mechanical and Aerospace Engineering Engineering::Mechanical engineering Ghost Imaging Phase Retrieval In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues caused by the inherent linearity and mechanism of computational ghost imaging. First, the primary information to be encrypted is transformed into the bits of information, which is used to control the formation of the customized data container. Then, the exclusive-OR (XOR) operation is performed on it with a randomly generated data container, and the XOR encoding result is scrambled based on the random sequence engendered with the logistic map so that the linearity of the cryptosystem is destroyed. Second, instead of using random phase-only masks, a number of phase masks retrieved from 2D patterns derived from the rows of the designed Hadamard matrix are used to record the measured intensities. The redundancy between these phase masks is low, which can reduce the number of the required phase-only masks greatly. Meanwhile, the conditions of the logistic map are considered as the secret keys, which can enhance the security level greatly due to their high sensitivity to tiny variation. The validity and feasibility of the proposed method have been demonstrated with a set of numerical simulations. Published version 2019-08-15T07:14:02Z 2019-12-06T22:19:37Z 2019-08-15T07:14:02Z 2019-12-06T22:19:37Z 2019 Journal Article Sui, L., Du, C., Xu, M., Tian, A., & Asundi, A. (2019). Information encryption based on the customized data container under the framework of computational ghost imaging. Optics Express, 27(12), 16493-16506. doi:10.1364/OE.27.016493 1094-4087 https://hdl.handle.net/10356/106846 http://hdl.handle.net/10220/49660 10.1364/OE.27.016493 en Optics Express © 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement. Users may use, reuse, and build upon the article, or use the article for text or data mining, so long as such uses are for non-commercial purposes and appropriate attribution is maintained. All other rights are reserved. 14 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Mechanical engineering Ghost Imaging Phase Retrieval |
spellingShingle |
Engineering::Mechanical engineering Ghost Imaging Phase Retrieval Sui, Liansheng Du, Cong Xu, Minjie Tian, Ailing Asundi, Anand Information encryption based on the customized data container under the framework of computational ghost imaging |
description |
In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues caused by the inherent linearity and mechanism of computational ghost imaging. First, the primary information to be encrypted is transformed into the bits of information, which is used to control the formation of the customized data container. Then, the exclusive-OR (XOR) operation is performed on it with a randomly generated data container, and the XOR encoding result is scrambled based on the random sequence engendered with the logistic map so that the linearity of the cryptosystem is destroyed. Second, instead of using random phase-only masks, a number of phase masks retrieved from 2D patterns derived from the rows of the designed Hadamard matrix are used to record the measured intensities. The redundancy between these phase masks is low, which can reduce the number of the required phase-only masks greatly. Meanwhile, the conditions of the logistic map are considered as the secret keys, which can enhance the security level greatly due to their high sensitivity to tiny variation. The validity and feasibility of the proposed method have been demonstrated with a set of numerical simulations. |
author2 |
School of Mechanical and Aerospace Engineering |
author_facet |
School of Mechanical and Aerospace Engineering Sui, Liansheng Du, Cong Xu, Minjie Tian, Ailing Asundi, Anand |
format |
Article |
author |
Sui, Liansheng Du, Cong Xu, Minjie Tian, Ailing Asundi, Anand |
author_sort |
Sui, Liansheng |
title |
Information encryption based on the customized data container under the framework of computational ghost imaging |
title_short |
Information encryption based on the customized data container under the framework of computational ghost imaging |
title_full |
Information encryption based on the customized data container under the framework of computational ghost imaging |
title_fullStr |
Information encryption based on the customized data container under the framework of computational ghost imaging |
title_full_unstemmed |
Information encryption based on the customized data container under the framework of computational ghost imaging |
title_sort |
information encryption based on the customized data container under the framework of computational ghost imaging |
publishDate |
2019 |
url |
https://hdl.handle.net/10356/106846 http://hdl.handle.net/10220/49660 |
_version_ |
1759853931270242304 |