Information Security Scheme Based on Computational Temporal Ghost Imaging
Abstract An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption pr...
Guardado en:
Autores principales: | , , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2017
|
Materias: | |
Acceso en línea: | https://doaj.org/article/ae09a01ec0ab4583999b2f37c8ba5b47 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:ae09a01ec0ab4583999b2f37c8ba5b47 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:ae09a01ec0ab4583999b2f37c8ba5b472021-12-02T15:05:35ZInformation Security Scheme Based on Computational Temporal Ghost Imaging10.1038/s41598-017-07816-22045-2322https://doaj.org/article/ae09a01ec0ab4583999b2f37c8ba5b472017-08-01T00:00:00Zhttps://doi.org/10.1038/s41598-017-07816-2https://doaj.org/toc/2045-2322Abstract An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.Shan JiangYurong WangTao LongXiangfeng MengXiulun YangRong ShuBaoqing SunNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 7, Iss 1, Pp 1-8 (2017) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q Shan Jiang Yurong Wang Tao Long Xiangfeng Meng Xiulun Yang Rong Shu Baoqing Sun Information Security Scheme Based on Computational Temporal Ghost Imaging |
description |
Abstract An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively. |
format |
article |
author |
Shan Jiang Yurong Wang Tao Long Xiangfeng Meng Xiulun Yang Rong Shu Baoqing Sun |
author_facet |
Shan Jiang Yurong Wang Tao Long Xiangfeng Meng Xiulun Yang Rong Shu Baoqing Sun |
author_sort |
Shan Jiang |
title |
Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_short |
Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_full |
Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_fullStr |
Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_full_unstemmed |
Information Security Scheme Based on Computational Temporal Ghost Imaging |
title_sort |
information security scheme based on computational temporal ghost imaging |
publisher |
Nature Portfolio |
publishDate |
2017 |
url |
https://doaj.org/article/ae09a01ec0ab4583999b2f37c8ba5b47 |
work_keys_str_mv |
AT shanjiang informationsecurityschemebasedoncomputationaltemporalghostimaging AT yurongwang informationsecurityschemebasedoncomputationaltemporalghostimaging AT taolong informationsecurityschemebasedoncomputationaltemporalghostimaging AT xiangfengmeng informationsecurityschemebasedoncomputationaltemporalghostimaging AT xiulunyang informationsecurityschemebasedoncomputationaltemporalghostimaging AT rongshu informationsecurityschemebasedoncomputationaltemporalghostimaging AT baoqingsun informationsecurityschemebasedoncomputationaltemporalghostimaging |
_version_ |
1718388787372883968 |