Abstract
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
Highlights
Information security is an important factor in modern communication and propagation techniques
We propose a new scheme of information encryption based on the concepts of computational temporal ghost imaging (CTGI), which keeps the advantages of Computational ghost imaging (CGI) and overcomes its weakness due to the fact that CTGI can reconstruct ultrafast signal with a slow detector after a long exposure time[23]
The 1D data stream and the secret key are analogous to the temporal signal to be reconstructed and the randomly fluctuating transverse intensity patterns emitted from light source or spatial light modulator in CTGI, respectively
Summary
Shan Jiang[1], Yurong Wang[1], Tao Long[1], Xiangfeng Meng[1], Xiulun Yang[1], Rong Shu2 & Baoqing Sun[1]. Compared with traditional optical information encryption, CGI provides a radically different and alternative approach for optical encryption It has the advantages of both better security and robustness owing to the randomness of the special secret key and simple optical realization. Computational temporal ghost imaging (CTGI)[26] has been proposed and demonstrated experimentally, which is inspired by CGI and can greatly simplify the setup of TGI and gain a better reconstruction of a single non-reproducible, periodic or non-periodic, temporal signal. The decryption process can be realized by using correlation measurement or calculation between the encrypted information and the secret keys In this process, the 1D data stream and the secret key are analogous to the temporal signal to be reconstructed and the randomly fluctuating transverse intensity patterns emitted from light source or spatial light modulator in CTGI, respectively. In Result, a series of simulated experiments are provided to validate the feasibility and evaluate the performance of the proposed method
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have