Research on Double-Layers optical information Encryption Based on Ghost Imaging

Abstract With the development of technology, digital images are greatly threatened during transmission. It is difficult to ensure the security of information in the early traditional encryption methods. Using different encryption technologies to form a secondary encryption can greatly improve the security of image encryption transmission, but facing the problems of low efficiency and poor accuracy. Based on ghost imaging and compressed sensing technology, this paper proposes a new optical information encryption algorithm: Double-Layered and Secondary Encryption Based on Ghost Imaging (LSGI). In this paper, the feasibility of the algorithm is further studied and analyzed. Numerical simulations show that the algorithm can effectively improve the security. Experiments show that the algorithm can also improve the accuracy of restoration.

[1]  Zhengjun Liu,et al.  Double image encryption based on iterative fractional Fourier transform , 2007 .

[2]  Jeffrey H. Shapiro,et al.  Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[3]  Karim Kemih,et al.  Novel encryption method based on optical time-delay chaotic system and a wavelet for data transmission , 2018, Optics & Laser Technology.

[4]  J. Shapiro,et al.  Normalized ghost imaging , 2012, 1212.5041.

[5]  Osamu Matoba,et al.  Optical Techniques for Information Security , 2009, Proceedings of the IEEE.

[6]  A. Gatti,et al.  Differential ghost imaging. , 2010, Physical review letters.

[7]  Zhishen Tong,et al.  Spectral Camera based on Ghost Imaging via Sparsity Constraints , 2015, Scientific Reports.

[8]  John T. Sheridan,et al.  A review of optical image encryption techniques , 2014 .

[9]  Jun Xiong,et al.  Properties of high-order ghost imaging with natural light. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.

[10]  D. Klyshko Two-photon light: influence of filtration and a new possible EPR experiment , 1988 .

[11]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[12]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[13]  Li Dapeng,et al.  Parallel compressive ghost imaging based on threshold segmentation , 2016 .

[14]  Le Wang,et al.  High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique , 2015 .

[15]  Wenlin Gong,et al.  Sub-Rayleigh ghost imaging via sparsity constraints based on a digital micro-mirror device , 2013 .

[16]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[17]  Jeffrey H. Shapiro,et al.  The physics of ghost imaging , 2012, Quantum Information Processing.