School of Information Science and Engineering, Shandong University; Shandong Provincial Key Laboratory of Laser Technology and Application, Jinan, 250100, China.
Key Laboratory of Space Active Opto-Electronics Technology of CAS, Shanghai Institute of Technical Physics, Chinese Academy of Sciences, Shanghai, 200083, China.
Sci Rep. 2017 Aug 9;7(1):7676. doi: 10.1038/s41598-017-07816-2.
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
提出了一种基于计算时频鬼成像的信息安全方案。该方案使用一系列独立的二维随机二进制模式作为加密密钥与一维数据流相乘,通过对加密密钥加权求和得到密文。解密过程可以通过加密信息与加密密钥之间的相关测量来实现。由于密钥本身具有很高的随机性,因此该方法的安全性得到了极大的保证。通过仿真分别讨论了该方法的可行性和对遮挡及额外噪声攻击的鲁棒性。