† Corresponding author. E-mail:
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging (CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously, it has a higher security. When the eavesdropping ratio (ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.
Since it was experimentally demonstrated with an entangled source in 1995 by Pittman et al.,[1] ghost imaging (GI) has attracted a lot of attention. Its successful realization with thermal light in 2002[2] made GI become a promising field to obtain higher resolution images. Especially, a new configuration of the GI system, called computational ghost imaging (CGI),[3] opened up some new perspectives with the GI system. The key principle of GI is the correlation between the two signals obtained from two separated detectors in a GI system, where one signal is recorded by a bucket detector in the signal beam to collect all the illumination passing through an object, and the other is the intensity signal collected in the reference beam with a high spatial resolution detector, such as a charge coupled device (CCD). The image is retrieved at the reference beam after the correlation between the signals from both beams.[4–17] The past has witnessed the rapid developments of the GI technique. For example, Ferri et al. presented the differential ghost imaging (DGI) to enhance the signal-to-noise ratio of recovering images.[12] Bromberg et al. experimentally demonstrated a GI technique using only a single detector.[14] Cao et al. discussed the geometrical optics of a GI system,[15] and achieved color GI with pseudo-white-thermal light.[16]
Recently, GI has found its novel application in optical encryption.[18–26] For example, in 2010, Clemente et al. proposed an optical encryption scheme based on computational GI to encrypt and securely transmit information to a remote party.[23] Successively, Tanha et al. proposed a gray and color optical encryption scheme to improve the security and developed the application in 2012.[24] Kong et al. proposed an approach to encrypt ghost images by flexibly manipulating the position correlation of a pair of ‘signal’ and ‘idler’ beams.[25] We presented a QR-coded compressive ghost imaging optical encryption, where the computational GI technique, QR code, and compressive sensing technique are adopted in the scheme.[27] Additionally, Li et al. proposed a new protocol of high-speed secure key distribution over an optical network based on computational correlation imaging.[21] It is shown that the optical encryption schemes based on CGI have noticeably reduced the number of the bits required to transmit an image because the encryption of the object image is not a complex valued matrix but simply an intensity vector. However, the series random speckle patterns to produce the detection results in the signal beam are commonly selected as a secure key in most existing optical encryption schemes, and they have to be transmitted to the authorized users in a private channel. Hence, the corresponding key distribution is a severe task in the realizations of the existing optical encryption schemes based on the CGI system. A secure and only with a little key distribution scheme is a promising direction.
In this paper, we propose a secure optical encryption scheme based on CGI with a small key. Here, a permutation sequence of the random speckle patterns, instead of the random speckle patterns themselves, is used as the secure key. In the proposed scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a CGI system. Then Alice permutes the order of the random speckle patterns and keeps the permutation sequence as a secure key. Later, Alice transmits the disordered speckle patterns and the detection results to Bob by a public channel, and sends the permutation sequence to Bob by a private channel. The unauthorized users cannot reconstruct the object because the correlations between the detection results and the speckle patterns are destroyed. On the contrary, the legitimate users could reorder the random speckle patterns by the received key, and recover the object with the theory of CGI.
This paper is organized as follows. In Section
Figure
The detection result
Then, the imaging of the object can be reconstructed with the second-order correlation
On the other hand, the unauthorized users cannot recover the imaging
In this section, we testify the proposed optical encryption scheme by experiment and numerical simulations. In addition, we discuss the vulnerability of the proposed scheme to eavesdropping.
Figure
In order to qualify the reconstructed image objectively, the mean square error (MSE) and peak signal-to-noise ratio (PSNR) are used as evaluations, which are defined as[27]
We first demonstrate the feasibility of the proposed encryption scheme in Fig.
We then test the security of the proposed encryption scheme with the object ‘NUPT’ and compare with the results of the encryption scheme in Ref. [23]. Assume that a potential eavesdropper, who knows the proper reconstruction mechanism, has unauthorized access to a fraction (eavesdropping ratio, ER) of the secure key and uses the corresponding correct speckle patterns to reconstruct the image. The value of ER is set from 0 to 50%.
Figures
We have proposed an optical encryption scheme based on the CGI system with disordered speckles. Alice produces the random speckle patterns and obtains the detection results with these random speckle patterns by the CGI technique. Later, she permutes the order of the random speckle patterns and shares the permutation sequence as a secret key to the authorized users. With the secret key, the legitimated user could recover the object, whereas the unauthorized user could not obtain any information of the object. It has similar results to the encryption scheme in Ref. [23], however, it has a much smaller key. The simulation and experiment results show the feasibility and the security of the proposed scheme. When the ER is less than 40%, the eavesdropper cannot acquire any useful information of the encrypted image. Meanwhile, the authorized users could recover completely the encrypted information with the secret key. The proposed optical encryption scheme has a samller key distribution in the private channel with a higher security. It has provided a practical method to complement optical encryption with the CGI system.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] |