• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于计算时频鬼成像的信息安全方案

Information Security Scheme Based on Computational Temporal Ghost Imaging.

机构信息

School of Information Science and Engineering, Shandong University; Shandong Provincial Key Laboratory of Laser Technology and Application, Jinan, 250100, China.

Key Laboratory of Space Active Opto-Electronics Technology of CAS, Shanghai Institute of Technical Physics, Chinese Academy of Sciences, Shanghai, 200083, China.

出版信息

Sci Rep. 2017 Aug 9;7(1):7676. doi: 10.1038/s41598-017-07816-2.

DOI:10.1038/s41598-017-07816-2
PMID:28794473
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5550463/
Abstract

An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.

摘要

提出了一种基于计算时频鬼成像的信息安全方案。该方案使用一系列独立的二维随机二进制模式作为加密密钥与一维数据流相乘,通过对加密密钥加权求和得到密文。解密过程可以通过加密信息与加密密钥之间的相关测量来实现。由于密钥本身具有很高的随机性,因此该方法的安全性得到了极大的保证。通过仿真分别讨论了该方法的可行性和对遮挡及额外噪声攻击的鲁棒性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/a0642d9d3451/41598_2017_7816_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/7b73ec927b73/41598_2017_7816_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/134c2596c092/41598_2017_7816_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/e4331b388da9/41598_2017_7816_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/7d9b6b0a80aa/41598_2017_7816_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/8166829ffab1/41598_2017_7816_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/9336cd8fc255/41598_2017_7816_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/a0642d9d3451/41598_2017_7816_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/7b73ec927b73/41598_2017_7816_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/134c2596c092/41598_2017_7816_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/e4331b388da9/41598_2017_7816_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/7d9b6b0a80aa/41598_2017_7816_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/8166829ffab1/41598_2017_7816_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/9336cd8fc255/41598_2017_7816_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0649/5550463/a0642d9d3451/41598_2017_7816_Fig7_HTML.jpg

相似文献

1
Information Security Scheme Based on Computational Temporal Ghost Imaging.基于计算时频鬼成像的信息安全方案
Sci Rep. 2017 Aug 9;7(1):7676. doi: 10.1038/s41598-017-07816-2.
2
A fine-grained reversible data hiding in encrypted domain based on the cipher-text redundancy of encryption process.一种基于加密过程密文冗余的加密域内细粒度可逆数据隐藏方法。
Heliyon. 2024 May 18;10(11):e31542. doi: 10.1016/j.heliyon.2024.e31542. eCollection 2024 Jun 15.
3
Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.基于二进制相移键控和混沌的远程医疗多用户通信方案。
Comput Methods Programs Biomed. 2018 Aug;162:165-175. doi: 10.1016/j.cmpb.2018.05.021. Epub 2018 May 17.
4
Information encryption based on the customized data container under the framework of computational ghost imaging.基于计算鬼成像框架下定制数据容器的信息加密
Opt Express. 2019 Jun 10;27(12):16493-16506. doi: 10.1364/OE.27.016493.
5
Optical stream-cipher-like system for image encryption based on Michelson interferometer.基于迈克尔逊干涉仪的类光流密码图像加密系统。
Opt Express. 2011 Jan 31;19(3):2634-42. doi: 10.1364/OE.19.002634.
6
Binary-tree encryption strategy for optical multiple-image encryption.用于光学多图像加密的二叉树加密策略。
Appl Opt. 2016 Jul 10;55(20):5280-91. doi: 10.1364/AO.55.005280.
7
Multi-Image Encryption Method via Computational Integral Imaging Algorithm.基于计算积分成像算法的多图像加密方法
Entropy (Basel). 2022 Jul 18;24(7):996. doi: 10.3390/e24070996.
8
An Image Compression Encryption Algorithm Based on Chaos and ZUC Stream Cipher.一种基于混沌和祖冲之流密码的图像压缩加密算法
Entropy (Basel). 2022 May 23;24(5):742. doi: 10.3390/e24050742.
9
Simultaneous transmission for an encrypted image and a double random-phase encryption key.加密图像与双随机相位加密密钥的同时传输。
Appl Opt. 2007 Jun 20;46(18):3747-53. doi: 10.1364/ao.46.003747.
10
Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system.基于时空混沌系统的H.264/AVC动态视频加密算法
J Opt Soc Am A Opt Image Sci Vis. 2016 Jun 1;33(6):1166-74. doi: 10.1364/JOSAA.33.001166.

引用本文的文献

1
Mid-infrared computational temporal ghost imaging.中红外计算时域鬼成像。
Light Sci Appl. 2024 May 28;13(1):124. doi: 10.1038/s41377-024-01426-0.
2
2-Nitro- and 4-fluorocinnamaldehyde based receptors as naked-eye chemosensors to potential molecular keypad lock.基于 2-硝基-和 4-氟肉桂醛的受体作为肉眼化学传感器,用于潜在的分子键盘锁。
Sci Rep. 2021 Oct 21;11(1):20847. doi: 10.1038/s41598-021-99599-w.

本文引用的文献

1
3D computational imaging with single-pixel detectors.基于单像素探测器的三维计算成像。
Science. 2013 May 17;340(6134):844-7. doi: 10.1126/science.1234454.
2
Computational ghost imaging for remote sensing.用于遥感的计算鬼成像。
J Opt Soc Am A Opt Image Sci Vis. 2012 May 1;29(5):782-9. doi: 10.1364/JOSAA.29.000782.
3
Optical image encryption based on diffractive imaging.基于衍射成像的光学图像加密。
Opt Lett. 2010 Nov 15;35(22):3817-9. doi: 10.1364/OL.35.003817.
4
Optical encryption based on computational ghost imaging.基于计算鬼成像的光学加密。
Opt Lett. 2010 Jul 15;35(14):2391-3. doi: 10.1364/OL.35.002391.
5
Double random phase encryption scheme to multiplex and simultaneous encode multiple images.用于复用和同时编码多幅图像的双随机相位加密方案。
Appl Opt. 2009 Nov 1;48(31):5933-47. doi: 10.1364/AO.48.005933.
6
Optical image encryption based on input plane and Fourier plane random encoding.基于输入平面和傅里叶平面随机编码的光学图像加密。
Opt Lett. 1995 Apr 1;20(7):767-9. doi: 10.1364/ol.20.000767.
7
Optical image encryption based on interference.基于干涉的光学图像加密
Opt Lett. 2008 Nov 1;33(21):2443-5. doi: 10.1364/ol.33.002443.
8
Optical encryption by double-random phase encoding in the fractional Fourier domain.分数傅里叶域中双随机相位编码的光学加密
Opt Lett. 2000 Jun 15;25(12):887-9. doi: 10.1364/ol.25.000887.
9
Securing information by use of digital holography.利用数字全息术保护信息。
Opt Lett. 2000 Jan 1;25(1):28-30. doi: 10.1364/ol.25.000028.
10
Information security system by iterative multiple-phase retrieval and pixel random permutation.
Appl Opt. 2006 May 10;45(14):3289-97. doi: 10.1364/ao.45.003289.