Journal Title : International Journal of Modern Trends in Engineering and Science
Paper Title : AN IMAGE SECURITY ENHANCEMENT FOR COMPUTATIONAL GHOST IMAGING USING INVERTIBLE MATRIX MODULATION
Volume 04 Issue 01 2017
ISSN no: 2348-3121
Page no: 1-3
Abstract – Optical cryptography based on computational ghost imaging(CGI) has attracted much attention of researchers because it encrypts plain text in to a random intensity vector rather than complex-valued function. This promising feature of the CGI-based cryptography reduces the amount of data to be transmitted and stored and therefore brings convenience in practice. However, we find that this cryptography is vulnerable to chosen-plain text attack because of the linear relationship between the input and output of the encryption system, and three feasible strategies are proposed to break it in this project. Even though a large number of plain text needs to be chosen in these attack methods, it means that this cryptography still exists security risks. To avoid these attacks, a security enhancement method utilizing an invertible matrix modulation is further discussed and the feasibility is verified by numerical simulations.
Keywords— Optical Cryptography,Ghost,Plain text
- Javidi, B. (Ed.). (2006). Optical and digital techniques for information security (Vol. 1). Springer Science & Business Media.
- Shapiro, J. H. (2009). Computational ghost imaging. Physical Review A, 78(6), 061802.
- Markman, A. (2014). Optical Security using the Double-Random-Phase Encryption with Photon-Counting.
- Shi, Y., Li, T., Wang, Y., Gao, Q., Zhang, S., & Li, H. (2013). Optical image encryption via ptychography. Optics letters, 38(9), 1425-1427.
- Unnikrishnan, G., Joseph, J., & Singh, K. (2000). Optical encryption by double-random phase encoding in the fractional Fourier domain. Optics letters, 25(12), 887-889.
- Situ, G., & Zhang, J. (2004). Double random-phase encoding in the Fresnel domain. Optics Letters, 29(14), 1584-1586.
- Meng, X. F., Cai, L. Z., Xu, X. F., Yang, X. L., Shen, X. X., Dong, G. Y., & Wang, Y. R. (2006). Two-step phase-shifting interferometry and its application in image encryption. Optics Letters, 31(10), 1414-1416.
- Zhang, Y., & Wang, B. (2008). Optical image encryption based on interference. Optics Letters, 33(21), 2443-2445.