2022
DOI: 10.1088/2040-8986/ac6597
|View full text |Cite
|
Sign up to set email alerts
|

An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding

Abstract: An encryption method based on computational ghost imaging (CGI) with chaotic mapping and DNA encoding is proposed. To reduce the amount of keys in the CGI-based encryption system, the chaotic mapping algorithm is used to generate the random sequence as the speckle measurement matrix of CGI system. The measurement data of the bucket detector is subjected to block and DNA operations, which introduce the nonlinear characteristics in the encryption process. The problem of linear vulnerability of the encryption sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…The phase, intensity, and wavelength of light are used in optical data encryption [26][27][28]. Recently, a number of optical encryption strategies have been introduced, including GI encryption, chaotic encryption [29], and dual random phase encryption [30]. The first optical data encryption method based on CGI was introduced by Clemente et al [26].…”
Section: Introductionmentioning
confidence: 99%
“…The phase, intensity, and wavelength of light are used in optical data encryption [26][27][28]. Recently, a number of optical encryption strategies have been introduced, including GI encryption, chaotic encryption [29], and dual random phase encryption [30]. The first optical data encryption method based on CGI was introduced by Clemente et al [26].…”
Section: Introductionmentioning
confidence: 99%
“…In 2023, Yuan et al proposed a multi-user optical encryption scheme based on ghost imaging, in which a common ciphertext is disclosed to all users, this scheme not only reduces the transmission amount of key data, but also improves the quality of decrypted images 13 . With the continuous progress of society, the research of ghost imaging in the field of optical encryption is becoming more and more mature 14 , 15 .…”
Section: Introductionmentioning
confidence: 99%
“…For example, the DNA encryption algorithm based on chaos [19][20][21]: Yang et al proposed CGI image encryption, which uses logistic chaotic to generate the keystream of the cryptosystem and combines with DNA encoding to obtain ciphertext images. This method reduces the number of key transmissions and has great advantages in image encryption with large amounts of data [19].…”
Section: Introductionmentioning
confidence: 99%
“…For example, the DNA encryption algorithm based on chaos [19][20][21]: Yang et al proposed CGI image encryption, which uses logistic chaotic to generate the keystream of the cryptosystem and combines with DNA encoding to obtain ciphertext images. This method reduces the number of key transmissions and has great advantages in image encryption with large amounts of data [19]. Quantum encryption algorithm based on chaos theory [22][23][24]: the keystream generated by the four-wing chaotic system is XORed with the plaintext to obtain a semiencrypted ciphertext image, and quantum rotation is used to complete the encryption operation in the diffusion stage.…”
Section: Introductionmentioning
confidence: 99%