Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation
The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Photonics Journal |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7890997/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1839645158961840128 |
---|---|
author | Yi Qin Yingying Zhang |
author_facet | Yi Qin Yingying Zhang |
author_sort | Yi Qin |
collection | DOAJ |
description | The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results. |
format | Article |
id | doaj-art-f4d190b2877b49a4bed9c8b31d6f89a2 |
institution | Matheson Library |
issn | 1943-0655 |
language | English |
publishDate | 2017-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Photonics Journal |
spelling | doaj-art-f4d190b2877b49a4bed9c8b31d6f89a22025-07-01T23:22:11ZengIEEEIEEE Photonics Journal1943-06552017-01-01921810.1109/JPHOT.2017.26903147890997Information Encryption in Ghost Imaging With Customized Data Container and XOR OperationYi Qin0Yingying Zhang1College of Mechanical and Electrical Engineering, Nanyang Normal University, Nanyang, ChinaCollege of Physical and Electrical Engineering, Nanyang Normal University, Nanyang, ChinaThe conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.https://ieeexplore.ieee.org/document/7890997/Optical encryptionghost imagingexclusive-OR (XOR) operation. |
spellingShingle | Yi Qin Yingying Zhang Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation IEEE Photonics Journal Optical encryption ghost imaging exclusive-OR (XOR) operation. |
title | Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation |
title_full | Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation |
title_fullStr | Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation |
title_full_unstemmed | Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation |
title_short | Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation |
title_sort | information encryption in ghost imaging with customized data container and xor operation |
topic | Optical encryption ghost imaging exclusive-OR (XOR) operation. |
url | https://ieeexplore.ieee.org/document/7890997/ |
work_keys_str_mv | AT yiqin informationencryptioninghostimagingwithcustomizeddatacontainerandxoroperation AT yingyingzhang informationencryptioninghostimagingwithcustomizeddatacontainerandxoroperation |