Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • Journal of the Optical Society of Korea
  • Vol. 20,
  • Issue 4,
  • pp. 476-480
  • (2016)

Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation

Open Access Open Access

Abstract

For the application of multiusers, the arrangement and distribution of the keys is a much concerning problem in a cryptosystem. In this paper, we propose an optical encryption scheme with multiple users based on computational ghost imaging (CGI) and orthogonal modulation. The CGI encrypts the secret image into an intensity vector rather than a complex-valued matrix. This will bring convenience for post-processing and transmission of the ciphertext. The orthogonal vectors are taken as the address codes to distinguish users and avoid cross-talk. Only the decryption key and the address code owned by an authorized user are matched, the secret image belonging to him/her could be extracted from the ciphertext. Therefore, there are two security levels in the encryption scheme. The feasibility and property are verified by numerical simulations.

© 2016 Optical Society of Korea

PDF Article
More Like This
Optical cryptosystem based on computational ghost imaging and nonlinear authentication

Lin Zhang, Xiaogang Wang, Qingming Zhou, Jidong Xue, and Bijun Xu
Opt. Express 32(3) 4242-4253 (2024)

Forgery attack on optical encryption based on computational ghost imaging

Sheng Yuan, Lanjie Wang, Xuemei Liu, and Xin Zhou
Opt. Lett. 45(14) 3917-3920 (2020)

Optical encryption based on computational ghost imaging

Pere Clemente, Vicente Durán, Víctor Torres-Company, Enrique Tajahuerce, and Jesús Lancis
Opt. Lett. 35(14) 2391-2393 (2010)

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.


Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.