中国物理B ›› 2017, Vol. 26 ›› Issue (5): 54205-054205.doi: 10.1088/1674-1056/26/5/054205

• ELECTROMAGNETISM, OPTICS, ACOUSTICS, HEAT TRANSFER, CLASSICAL MECHANICS, AND FLUID DYNAMICS • 上一篇    下一篇

Optical encryption scheme based on ghost imaging with disordered speckles

Yu-dong Zhang(张玉东), Sheng-mei Zhao(赵生妹)   

  1. 1 Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China;
    2 Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing 210003, China
  • 收稿日期:2016-09-11 修回日期:2017-01-07 出版日期:2017-05-05 发布日期:2017-05-05
  • 通讯作者: Sheng-mei Zhao E-mail:zhaosm@njupt.edu.cn
  • 基金资助:
    Project supported by the National Natural Science Foundation of China (Grant Nos. 61475075 and 61271238) and the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, China (Grant No. NYKL2015011).

Optical encryption scheme based on ghost imaging with disordered speckles

Yu-dong Zhang(张玉东)1, Sheng-mei Zhao(赵生妹)1,2   

  1. 1 Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China;
    2 Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing 210003, China
  • Received:2016-09-11 Revised:2017-01-07 Online:2017-05-05 Published:2017-05-05
  • Contact: Sheng-mei Zhao E-mail:zhaosm@njupt.edu.cn
  • Supported by:
    Project supported by the National Natural Science Foundation of China (Grant Nos. 61475075 and 61271238) and the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, China (Grant No. NYKL2015011).

摘要: An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging (CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously, it has a higher security. When the eavesdropping ratio (ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.

关键词: optical encryption, computational ghost imaging, small key, disordered speckles

Abstract: An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging (CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously, it has a higher security. When the eavesdropping ratio (ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.

Key words: optical encryption, computational ghost imaging, small key, disordered speckles

中图分类号:  (Imaging and optical processing)

  • 42.30.-d
42.30.Wb (Image reconstruction; tomography) 42.30.Va (Image forming and processing)