A novel ghost imaging-based optical cryptosystem for multiple images using the integral property of the Fourier transform is proposed.Different from other multiple-image encryption schemes,we mainly construct the modu...A novel ghost imaging-based optical cryptosystem for multiple images using the integral property of the Fourier transform is proposed.Different from other multiple-image encryption schemes,we mainly construct the modulation patterns related to the plaintext images to realize the encrypted transmission of multiple images.In encryption process,the first image is encrypted by the ghost imaging encryption scheme,and the intensity sequence obtained by the bucket detector is used as the ciphertext.Then modulation patterns of other images are constructed by using the integral property of the Fourier transform and used as the keys.Finally,the ciphertext and keys are transmitted to the receiver to complete the encryption process.During decryption,the receiver uses different keys to decrypt the ciphertext and gets different plaintext images,and decrypted images have no image aliasing problem.Experiments and simulations verify the feasibility,security,and robustness of the proposed scheme.This scheme has high scalability and broad application prospect,which provides a new idea for optical information encryption.展开更多
A method is presented for one-to-many information encryption transmission by using temporal ghost imaging and code division multiple access.In the encryption transmission process,code division multiple access technolo...A method is presented for one-to-many information encryption transmission by using temporal ghost imaging and code division multiple access.In the encryption transmission process,code division multiple access technologies combine multiple information sources,and the chip sequence corresponding to each set of information is used as the first key.The transmission end loads the transmission information onto a series of temporal random patterns of temporal ghost imaging and transmits it to the receivers.A series of temporal random patterns is the second key.During the decryption,each receiver can get the same encrypted information and use the second key to obtain the transmitted information.Finally,each receiver uses the unique chip sequence to get corresponding information.This encryption transmission method realizes one-to-many information encryption transmission at the same time over the same channel.Double encryption ensures the security of information.Simulation and experiment results verify the effectiveness and security of the method.The method has strong antinoise ability and can effectively resist various attack modes.At the same time,this method solves the problem that the use of code division multiple access enlarges the signal bandwidth,and ensures that no cross talk occurs between various sources of information.展开更多
基金Project supported by the Natural Science Foundation of Shanghai,China(Grant No.18ZR1425800)the National Natural Science Foundation of China(Grant Nos.61875125 and 61775140)。
文摘A novel ghost imaging-based optical cryptosystem for multiple images using the integral property of the Fourier transform is proposed.Different from other multiple-image encryption schemes,we mainly construct the modulation patterns related to the plaintext images to realize the encrypted transmission of multiple images.In encryption process,the first image is encrypted by the ghost imaging encryption scheme,and the intensity sequence obtained by the bucket detector is used as the ciphertext.Then modulation patterns of other images are constructed by using the integral property of the Fourier transform and used as the keys.Finally,the ciphertext and keys are transmitted to the receiver to complete the encryption process.During decryption,the receiver uses different keys to decrypt the ciphertext and gets different plaintext images,and decrypted images have no image aliasing problem.Experiments and simulations verify the feasibility,security,and robustness of the proposed scheme.This scheme has high scalability and broad application prospect,which provides a new idea for optical information encryption.
基金Natural Science Foundation of Shanghai(18ZR1425800)Anhui Province Key Laboratory of Nondestructive Evaluation(CGHBMWSJC03)National Natural Science Foundation of China(61775140,61875125)
文摘A method is presented for one-to-many information encryption transmission by using temporal ghost imaging and code division multiple access.In the encryption transmission process,code division multiple access technologies combine multiple information sources,and the chip sequence corresponding to each set of information is used as the first key.The transmission end loads the transmission information onto a series of temporal random patterns of temporal ghost imaging and transmits it to the receivers.A series of temporal random patterns is the second key.During the decryption,each receiver can get the same encrypted information and use the second key to obtain the transmitted information.Finally,each receiver uses the unique chip sequence to get corresponding information.This encryption transmission method realizes one-to-many information encryption transmission at the same time over the same channel.Double encryption ensures the security of information.Simulation and experiment results verify the effectiveness and security of the method.The method has strong antinoise ability and can effectively resist various attack modes.At the same time,this method solves the problem that the use of code division multiple access enlarges the signal bandwidth,and ensures that no cross talk occurs between various sources of information.