Information encryption based on the customized data container under the framework of computational ghost imaging

In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues cau...

Full description

Saved in:
Bibliographic Details
Main Authors: Sui, Liansheng, Du, Cong, Xu, Minjie, Tian, Ailing, Asundi, Anand
Other Authors: School of Mechanical and Aerospace Engineering
Format: Article
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/106846
http://hdl.handle.net/10220/49660
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-106846
record_format dspace
spelling sg-ntu-dr.10356-1068462023-03-04T17:21:45Z Information encryption based on the customized data container under the framework of computational ghost imaging Sui, Liansheng Du, Cong Xu, Minjie Tian, Ailing Asundi, Anand School of Mechanical and Aerospace Engineering Engineering::Mechanical engineering Ghost Imaging Phase Retrieval In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues caused by the inherent linearity and mechanism of computational ghost imaging. First, the primary information to be encrypted is transformed into the bits of information, which is used to control the formation of the customized data container. Then, the exclusive-OR (XOR) operation is performed on it with a randomly generated data container, and the XOR encoding result is scrambled based on the random sequence engendered with the logistic map so that the linearity of the cryptosystem is destroyed. Second, instead of using random phase-only masks, a number of phase masks retrieved from 2D patterns derived from the rows of the designed Hadamard matrix are used to record the measured intensities. The redundancy between these phase masks is low, which can reduce the number of the required phase-only masks greatly. Meanwhile, the conditions of the logistic map are considered as the secret keys, which can enhance the security level greatly due to their high sensitivity to tiny variation. The validity and feasibility of the proposed method have been demonstrated with a set of numerical simulations. Published version 2019-08-15T07:14:02Z 2019-12-06T22:19:37Z 2019-08-15T07:14:02Z 2019-12-06T22:19:37Z 2019 Journal Article Sui, L., Du, C., Xu, M., Tian, A., & Asundi, A. (2019). Information encryption based on the customized data container under the framework of computational ghost imaging. Optics Express, 27(12), 16493-16506. doi:10.1364/OE.27.016493 1094-4087 https://hdl.handle.net/10356/106846 http://hdl.handle.net/10220/49660 10.1364/OE.27.016493 en Optics Express © 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement. Users may use, reuse, and build upon the article, or use the article for text or data mining, so long as such uses are for non-commercial purposes and appropriate attribution is maintained. All other rights are reserved. 14 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Mechanical engineering
Ghost Imaging
Phase Retrieval
spellingShingle Engineering::Mechanical engineering
Ghost Imaging
Phase Retrieval
Sui, Liansheng
Du, Cong
Xu, Minjie
Tian, Ailing
Asundi, Anand
Information encryption based on the customized data container under the framework of computational ghost imaging
description In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues caused by the inherent linearity and mechanism of computational ghost imaging. First, the primary information to be encrypted is transformed into the bits of information, which is used to control the formation of the customized data container. Then, the exclusive-OR (XOR) operation is performed on it with a randomly generated data container, and the XOR encoding result is scrambled based on the random sequence engendered with the logistic map so that the linearity of the cryptosystem is destroyed. Second, instead of using random phase-only masks, a number of phase masks retrieved from 2D patterns derived from the rows of the designed Hadamard matrix are used to record the measured intensities. The redundancy between these phase masks is low, which can reduce the number of the required phase-only masks greatly. Meanwhile, the conditions of the logistic map are considered as the secret keys, which can enhance the security level greatly due to their high sensitivity to tiny variation. The validity and feasibility of the proposed method have been demonstrated with a set of numerical simulations.
author2 School of Mechanical and Aerospace Engineering
author_facet School of Mechanical and Aerospace Engineering
Sui, Liansheng
Du, Cong
Xu, Minjie
Tian, Ailing
Asundi, Anand
format Article
author Sui, Liansheng
Du, Cong
Xu, Minjie
Tian, Ailing
Asundi, Anand
author_sort Sui, Liansheng
title Information encryption based on the customized data container under the framework of computational ghost imaging
title_short Information encryption based on the customized data container under the framework of computational ghost imaging
title_full Information encryption based on the customized data container under the framework of computational ghost imaging
title_fullStr Information encryption based on the customized data container under the framework of computational ghost imaging
title_full_unstemmed Information encryption based on the customized data container under the framework of computational ghost imaging
title_sort information encryption based on the customized data container under the framework of computational ghost imaging
publishDate 2019
url https://hdl.handle.net/10356/106846
http://hdl.handle.net/10220/49660
_version_ 1759853931270242304