Information Security Scheme Based on Computational Temporal Ghost Imaging

Abstract An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption pr...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Shan Jiang, Yurong Wang, Tao Long, Xiangfeng Meng, Xiulun Yang, Rong Shu, Baoqing Sun
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2017
Materias:
R
Q
Acceso en línea:https://doaj.org/article/ae09a01ec0ab4583999b2f37c8ba5b47
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:ae09a01ec0ab4583999b2f37c8ba5b47
record_format dspace
spelling oai:doaj.org-article:ae09a01ec0ab4583999b2f37c8ba5b472021-12-02T15:05:35ZInformation Security Scheme Based on Computational Temporal Ghost Imaging10.1038/s41598-017-07816-22045-2322https://doaj.org/article/ae09a01ec0ab4583999b2f37c8ba5b472017-08-01T00:00:00Zhttps://doi.org/10.1038/s41598-017-07816-2https://doaj.org/toc/2045-2322Abstract An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.Shan JiangYurong WangTao LongXiangfeng MengXiulun YangRong ShuBaoqing SunNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 7, Iss 1, Pp 1-8 (2017)
institution DOAJ
collection DOAJ
language EN
topic Medicine
R
Science
Q
spellingShingle Medicine
R
Science
Q
Shan Jiang
Yurong Wang
Tao Long
Xiangfeng Meng
Xiulun Yang
Rong Shu
Baoqing Sun
Information Security Scheme Based on Computational Temporal Ghost Imaging
description Abstract An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
format article
author Shan Jiang
Yurong Wang
Tao Long
Xiangfeng Meng
Xiulun Yang
Rong Shu
Baoqing Sun
author_facet Shan Jiang
Yurong Wang
Tao Long
Xiangfeng Meng
Xiulun Yang
Rong Shu
Baoqing Sun
author_sort Shan Jiang
title Information Security Scheme Based on Computational Temporal Ghost Imaging
title_short Information Security Scheme Based on Computational Temporal Ghost Imaging
title_full Information Security Scheme Based on Computational Temporal Ghost Imaging
title_fullStr Information Security Scheme Based on Computational Temporal Ghost Imaging
title_full_unstemmed Information Security Scheme Based on Computational Temporal Ghost Imaging
title_sort information security scheme based on computational temporal ghost imaging
publisher Nature Portfolio
publishDate 2017
url https://doaj.org/article/ae09a01ec0ab4583999b2f37c8ba5b47
work_keys_str_mv AT shanjiang informationsecurityschemebasedoncomputationaltemporalghostimaging
AT yurongwang informationsecurityschemebasedoncomputationaltemporalghostimaging
AT taolong informationsecurityschemebasedoncomputationaltemporalghostimaging
AT xiangfengmeng informationsecurityschemebasedoncomputationaltemporalghostimaging
AT xiulunyang informationsecurityschemebasedoncomputationaltemporalghostimaging
AT rongshu informationsecurityschemebasedoncomputationaltemporalghostimaging
AT baoqingsun informationsecurityschemebasedoncomputationaltemporalghostimaging
_version_ 1718388787372883968