Please wait a minute...
Chin. Phys. B, 2017, Vol. 26(5): 054205    DOI: 10.1088/1674-1056/26/5/054205
ELECTROMAGNETISM, OPTICS, ACOUSTICS, HEAT TRANSFER, CLASSICAL MECHANICS, AND FLUID DYNAMICS Prev   Next  

Optical encryption scheme based on ghost imaging with disordered speckles

Yu-dong Zhang(张玉东)1, Sheng-mei Zhao(赵生妹)1,2
1 Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China;
2 Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing 210003, China
Abstract  An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging (CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously, it has a higher security. When the eavesdropping ratio (ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.
Keywords:  optical encryption      computational ghost imaging      small key      disordered speckles  
Received:  11 September 2016      Revised:  07 January 2017      Accepted manuscript online: 
PACS:  42.30.-d (Imaging and optical processing)  
  42.50.Ar  
  42.30.Wb (Image reconstruction; tomography)  
  42.30.Va (Image forming and processing)  
Fund: Project supported by the National Natural Science Foundation of China (Grant Nos. 61475075 and 61271238) and the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, China (Grant No. NYKL2015011).
Corresponding Authors:  Sheng-mei Zhao     E-mail:  zhaosm@njupt.edu.cn

Cite this article: 

Yu-dong Zhang(张玉东), Sheng-mei Zhao(赵生妹) Optical encryption scheme based on ghost imaging with disordered speckles 2017 Chin. Phys. B 26 054205

[1] Pittman T B, Shih Y H, Strekalov D V and Sergienko A V 1995 Phys. Rev. A 52 3429
[2] Bennink R S, Bentley S J and Boyd R W 2002 Phys. Rev. Lett. 89 113601
[3] Shapiro J H 2008 Phys. Rev. A 78 061802
[4] Gatti A, Brambilla E, Bache M and Lugiato L A 2004 Phys. Rev. Lett. 93 093602
[5] Ferri F, Magatti D, Gatti A, Bache M, Brambilla E and Lugiato L A 2005 Phys. Rev. Lett. 94 183602
[6] Zhang D, Zhai Y H, Wu L A and Chen X H 2005 Opt. Lett. 30 2354
[7] Erkmen B I and Shapiro J H 2006 Phys. Rev. A 74 041601
[8] Meyers R, Deacon K S and Shih Y 2008 Phys. Rev. A 77 041801
[9] Erkmen B I and Shapiro J H 2008 Phys. Rev. A 77 043809
[10] Erkmen B I and Shapiro J H 2010 Adv. Opt. Pho. 2 405
[11] Li C, Wang T, Pu J, Zhu W and Rao R 2010 Appl. Phys. B 99 599
[12] Ferri F, Magatti D, Lugiato L and Gatti A 2010 Phys. Rev. Lett. 104 253603
[13] Li M F, Zhang Y R, Luo K H, Wu L A and Fan H 2013 Phys. Rev. A 87 033813
[14] Bromberg Y, Katz O and Silberberg Y 2009 Phys. Rev. A 79 053840
[15] Cao D Z, Xiong J and Wang K G 2005 Phys. Rev. A 71 013801
[16] Cao D Z, Xu B L, Zhang S H and Wand K G 2015 Chin. Phys. Lett. 32 114208
[17] Zhao S M and Zhuang P 2014 Chin. Phys. B 23 054203
[18] Wang L, Zhao S M, Cheng W W, Gong L Y, and Chen H W 2016 Opt. Commun. 366 314
[19] Liu Q, Luo K H, Chen X H and Wu L A 2010 Chin. Phys. B 19 094211
[20] Zafari M, Kheradmand M and Ahmadi-Kandjani S 2014 J. Opt. 16 105405
[21] Li S, Yao X R, Yu W K, Wu L A and Zhai G J 2013 Opt. Lett. 38 2144
[22] Tanha M, Kheradmand R and Ahmadi-Kandjani S 2013 Phys.Scr. 2013 014059
[23] Clemente P, Durán V, Torrescompany V, Tajahuerce E and Lancis J 2010 Opt.Lett. 35 2391
[24] Tanha M, Kheradmand R and Ahmadi-Kandjani S 2012 Appl. Phys. Lett. 101 101108
[25] Kong L J, Li Y N, Qian S X, Li S M, Tu C H and Wang H T 2013 Phys. Rev. A 88 013852
[26] Chen W and Chen X D 2013 Appl. Phys. Lett. 103 221106
[27] Zhao S M, Wang L, Liang W Q, Cheng W W and Gong L Y 2015 Opt. Commun. 353 90
[1] Deep-learning-based cryptanalysis of two types of nonlinear optical cryptosystems
Xiao-Gang Wang(汪小刚) and Hao-Yu Wei(魏浩宇). Chin. Phys. B, 2022, 31(9): 094202.
[2] High speed ghost imaging based on a heuristic algorithm and deep learning
Yi-Yi Huang(黄祎祎), Chen Ou-Yang(欧阳琛), Ke Fang(方可), Yu-Feng Dong(董玉峰), Jie Zhang(张杰), Li-Ming Chen(陈黎明), and Ling-An Wu(吴令安). Chin. Phys. B, 2021, 30(6): 064202.
[3] Computational ghost imaging with deep compressed sensing
Hao Zhang(张浩), Yunjie Xia(夏云杰), and Deyang Duan(段德洋). Chin. Phys. B, 2021, 30(12): 124209.
[4] Influence of random phase modulation on the imaging quality of computational ghost imaging
Chao Gao(高超), Xiao-Qian Wang(王晓茜), Hong-Ji Cai(蔡宏吉), Jie Ren(任捷), Ji-Yuan Liu(刘籍元), Zhi-Hai Yao(姚治海). Chin. Phys. B, 2019, 28(2): 020201.
[5] An encryption scheme based on phase-shifting digital holography and amplitude-phase disturbance
Hua Li-Li (花丽丽), Xu Ning (徐宁), Yang Geng (杨庚). Chin. Phys. B, 2014, 23(6): 064201.
[6] A new distribution scheme of decryption keys used in optical verification system with multiple-wavelength information
Niu Chun-Hui (牛春晖), Zhang Yan (张岩), Gu Ben-Yuan (顾本源). Chin. Phys. B, 2005, 14(10): 1996-2003.
No Suggested Reading articles found!