Computational ghost imaging with key-patterns for image encryption

OPTICS COMMUNICATIONS(2023)

引用 5|浏览5
暂无评分
摘要
Here, we propose an encryption scheme by computational ghost imaging (CGI), and the transmitting data have been hidden in the illumination patterns. The sender uses a set of key-patterns (KPs) from the KPs database to hide the data in the illumination patterns. It only needs to transfer a key vector which record the KPs labels (sequence positions in KPs database) in a private channel. The receiver gets this key vector from the private channel, and gets the KPs. So, the receiver can decrypt the patterns acquired from the public channel, which can recover the image with the aids of bucket detector values from public channel. Although the eavesdropper can obtain all the data in public channel, they cannot decrypt the information because the second-order correlation algorithm needs the correct patterns. In our scheme, encrypted transmission is very secure, convenient and fast, which is important and significant for real implications of CGI encryption.
更多
查看译文
关键词
Computational ghost imaging (CGI),Key-patterns (KPs),Image encryption
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要