Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation

The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level...

Full description

Saved in:
Bibliographic Details
Main Authors: Yi Qin, Yingying Zhang
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Photonics Journal
Subjects:
Online Access:https://ieeexplore.ieee.org/document/7890997/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1839645158961840128
author Yi Qin
Yingying Zhang
author_facet Yi Qin
Yingying Zhang
author_sort Yi Qin
collection DOAJ
description The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.
format Article
id doaj-art-f4d190b2877b49a4bed9c8b31d6f89a2
institution Matheson Library
issn 1943-0655
language English
publishDate 2017-01-01
publisher IEEE
record_format Article
series IEEE Photonics Journal
spelling doaj-art-f4d190b2877b49a4bed9c8b31d6f89a22025-07-01T23:22:11ZengIEEEIEEE Photonics Journal1943-06552017-01-01921810.1109/JPHOT.2017.26903147890997Information Encryption in Ghost Imaging With Customized Data Container and XOR OperationYi Qin0Yingying Zhang1College of Mechanical and Electrical Engineering, Nanyang Normal University, Nanyang, ChinaCollege of Physical and Electrical Engineering, Nanyang Normal University, Nanyang, ChinaThe conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.https://ieeexplore.ieee.org/document/7890997/Optical encryptionghost imagingexclusive-OR (XOR) operation.
spellingShingle Yi Qin
Yingying Zhang
Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation
IEEE Photonics Journal
Optical encryption
ghost imaging
exclusive-OR (XOR) operation.
title Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation
title_full Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation
title_fullStr Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation
title_full_unstemmed Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation
title_short Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation
title_sort information encryption in ghost imaging with customized data container and xor operation
topic Optical encryption
ghost imaging
exclusive-OR (XOR) operation.
url https://ieeexplore.ieee.org/document/7890997/
work_keys_str_mv AT yiqin informationencryptioninghostimagingwithcustomizeddatacontainerandxoroperation
AT yingyingzhang informationencryptioninghostimagingwithcustomizeddatacontainerandxoroperation