2018
DOI: 10.1088/1555-6611/aacc04
|View full text |Cite
|
Sign up to set email alerts
|

Non-destructive ghost authentication for single-pixel imaging in mass user environment

Abstract: A secured ghost imaging system can be constructed in a big data environment by generating many ciphertext sequences (including both correct and incorrect ones) from different object images and only allowing authorized users to retrieve the target correct ones. In such schemes, the identification of the truth of the ciphertext is a critical issue. In previous works, a ciphertext authentication scheme for a ghost imaging system was proposed by embedding ciphertext fractions generated from hidden images into the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Optical encryption, authentication and watermarking systems [1][2][3] can be constructed for information security applications, with advantages such as multi-dimensional parallel processing capabilities, fast processing speed and direct processing of physical objects without digitalization. In previous works, an image encryption system can be physically implemented with various types of optical imaging systems, including but not limited to double random phase encoding (DRPE) [4], holography [5,6], integral imaging [7][8][9], ptychography [10,11], and single-pixel imaging [12][13][14][15][16][17][18][19][20][21]. In these systems, the plaintext image is converted to a light field, which is optically transformed into a ciphertext light field with certain physical encryption keys (e.g.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Optical encryption, authentication and watermarking systems [1][2][3] can be constructed for information security applications, with advantages such as multi-dimensional parallel processing capabilities, fast processing speed and direct processing of physical objects without digitalization. In previous works, an image encryption system can be physically implemented with various types of optical imaging systems, including but not limited to double random phase encoding (DRPE) [4], holography [5,6], integral imaging [7][8][9], ptychography [10,11], and single-pixel imaging [12][13][14][15][16][17][18][19][20][21]. In these systems, the plaintext image is converted to a light field, which is optically transformed into a ciphertext light field with certain physical encryption keys (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…For other types of optical encryption systems such as DRPE [4], various implementations of encryption systems [24][25][26][27][28] and various types of cryptanalysis [29][30][31][32][33][34][35] including CPA, KPA and COA have been extensively investigated. However, for encrypted SPI, many works have been conducted on the design of encryption systems [12][13][14][15][16][17][18][19][20][21] since the earliest attempt [12] but little cryptanalysis has been investigated previously. As far as the author knows, only one such work [36] can be found, in which some CPA methods are proposed.…”
Section: Introductionmentioning
confidence: 99%