• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于计算鬼成像和非线性认证的光学密码系统。

Optical cryptosystem based on computational ghost imaging and nonlinear authentication.

作者信息

Zhang Lin, Wang Xiaogang, Zhou Qingming, Xue Jidong, Xu Bijun

出版信息

Opt Express. 2024 Jan 29;32(3):4242-4253. doi: 10.1364/OE.510356.

DOI:10.1364/OE.510356
PMID:38297629
Abstract

We propose an optical encryption system that combines computational ghost imaging (CGI) with image authentication to enhance security. In this scheme, Hadamard patterns are projected onto the secret images, while their reflected light intensities are captured using a bucket detector (BD). To further strengthen the security of the collected secret data, we encrypt it as a series of binary matrices serving as ciphertext. During the authentication key generation, these encoded binary matrices serve as illumination patterns in the CGI system for a non-secret image, which is used as a reference image for authentication. The data captured by the BD is then binarized to generate the authentication key. Upon successful authentication, the receiver obtains the decryption keys. This method achieves both data compression for secret images and enhanced security during information transmission. We validate the feasibility of this method through computer simulations and optical experiments.

摘要

我们提出了一种将计算鬼成像(CGI)与图像认证相结合以增强安全性的光学加密系统。在该方案中,将哈达玛图案投影到秘密图像上,同时使用桶探测器(BD)捕获其反射光强度。为了进一步加强所收集秘密数据的安全性,我们将其加密为一系列用作密文的二进制矩阵。在认证密钥生成过程中,这些编码的二进制矩阵在CGI系统中用作非秘密图像的照明图案,该非秘密图像用作认证的参考图像。然后将由BD捕获的数据进行二值化以生成认证密钥。认证成功后,接收方获得解密密钥。该方法既实现了秘密图像的数据压缩,又增强了信息传输过程中的安全性。我们通过计算机模拟和光学实验验证了该方法的可行性。

相似文献

1
Optical cryptosystem based on computational ghost imaging and nonlinear authentication.基于计算鬼成像和非线性认证的光学密码系统。
Opt Express. 2024 Jan 29;32(3):4242-4253. doi: 10.1364/OE.510356.
2
Steganographic optical image encryption based on single-pixel imaging and an untrained neural network.基于单像素成像和未训练神经网络的隐写光学图像加密。
Opt Express. 2022 Sep 26;30(20):36144-36154. doi: 10.1364/OE.467708.
3
Secret sharing scheme based on spread spectrum ghost imaging.基于扩频鬼成像的秘密共享方案。
Appl Opt. 2022 Aug 20;61(24):7102-7107. doi: 10.1364/AO.463885.
4
Experimental demonstration of ghost-imaging-based authentication in scattering media.基于鬼成像的散射介质认证实验演示。
Opt Express. 2019 Jul 22;27(15):20558-20566. doi: 10.1364/OE.27.020558.
5
An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.一种基于计算鬼成像和全变差最小化的光学多重图像认证方法。
Heliyon. 2023 Jun 29;9(7):e17682. doi: 10.1016/j.heliyon.2023.e17682. eCollection 2023 Jul.
6
Optical image encryption based on biometric keys and singular value decomposition.基于生物特征密钥和奇异值分解的光学图像加密
Appl Opt. 2020 Mar 10;59(8):2422-2430. doi: 10.1364/AO.385652.
7
Speckle-Based Optical Cryptosystem and its Application for Human Face Recognition via Deep Learning.基于散斑的光学加密系统及其在深度学习中的人脸识别应用。
Adv Sci (Weinh). 2022 Sep;9(25):e2202407. doi: 10.1002/advs.202202407. Epub 2022 Jun 24.
8
Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation.基于计算鬼成像和混合非凸二阶全变分的光学多图像认证
Opt Express. 2023 Jun 19;31(13):20887-20904. doi: 10.1364/OE.492608.
9
Information encryption based on the customized data container under the framework of computational ghost imaging.基于计算鬼成像框架下定制数据容器的信息加密
Opt Express. 2019 Jun 10;27(12):16493-16506. doi: 10.1364/OE.27.016493.
10
Computational ghost imaging with spatiotemporal encoding pseudo-random binary patterns.具有时空编码伪随机二进制模式的计算鬼成像
Opt Express. 2020 Oct 12;28(21):31163-31179. doi: 10.1364/OE.403375.