Font Size: a A A

Study Of Information Encryption Mechanism And Application Based On Ghost Imaging

Posted on:2021-04-05Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y KangFull Text:PDF
GTID:1488306746985539Subject:Optical Engineering
Abstract/Summary:PDF Full Text Request
With the development of globalization,information exchange is becoming more and more frequent,and the demand for information transmission and processing has gradually increased.Information security requirements have increased under the high transmission speed have.The PRISM project exposed by Edward Snowden has generated considerable attention for information security.Optical information security technology has been the focus of attention and widely studied because of its high speed,parallelism,multi-dimensionality,and other characteristics.Ghost imaging's non-locality properties are a new method of optical information security.The realization of ghost imaging in the time domain also provides a basis for encrypting the signal and even extending it to the secret optical communication.Based on the analysis of the existing ghost imaging encryption schemes,this paper improves the existing problems,and studies the application of time ghost imaging in the field of time-varying signal encryption.The primary highlights of this study are as follows:The traditional ghost imaging encryption is a symmetric encryption system,if the key is stolen,the information security will be threatened.In order to solve this problem,an optical camouflage encryption method based on ghost imaging is proposed.By constructing a series of specific modulated patterns,only the camouflaged image is encrypted,the generated ciphertext and the specific modulated patterns as the keys are transmitted to the receiver.The ciphertext is captured by authorized receivers and potential eavesdroppers.Only authorized receivers can acquire the secret image,while eavesdroppers can only obtain the camouflaged image if they steal the ciphertext and keys.The secret image is hidden by the camouflaged image,which protects the secret image's security by confusing the eavesdropper.The feasibility of the scheme is verified by experiments.This method has strong ability of anti-noise and anti-crack.Many ghost imaging encryption schemes,including the optical camouflage encryption method based on ghost imaging,have the problems of large amount of key data and the difficulty in distributing and managing.In order to solve this problem,an asymmetric optical encryption method based on ghost imaging and public key cryptography is proposed.The public key and private key are generated by the receiver,which solves the problem that the key in the phantom encryption system is difficult to distribute and realizes the transformation from symmetric encryption to asymmetric encryption.According to the stealth characteristics of the phase object in ghost imaging,it is the primary key and encrypted by public key algorithm.The primary key is small,which compensates for the lack of processing speed of large data encryption and decryption using the public key algorithm,and solves the problem of a large amount of key data in ghost imaging encryption.As a decryption algorithm,deep learning algorithm can achieve high-quality plaintext reconstruction with less ciphertext,and has strong denoising ability.Security and robustness analysis shows that the scheme,as an asymmetric encryption scheme with high security,strong robustness and low cost,provides new possibilities for information encryption and data storage.The encryption of temporal ghost imaging for time-varying signals expands the application of ghost imaging encryption.To improve the reconstruction effect of the temporal ghost imaging encryption scheme the temporal patterns are studied,and the effects of different temporal patterns on sampling rate,anti-noise capability and universality are analyzed.Combining the security characteristics of chaotic light and the advantages of temporal ghost imaging,a temporal ghost image encryption transmission method based on chaotic light is proposed.Compared with other modes,this technique mainly uses chaotic light as the modulation light source,which has a larger key space,higher key sensitivity,and better protection against attacks.To further improve the efficiency and data of temporal ghost imaging encryption scheme,a multi-signal encryption scheme based on temporal ghost imaging and code division multiple access technology is proposed.Code division multiple access technology achieves information mixing,the orthogonality of its chip sequence also improves the signal-to-noise ratio of the reconstructed signal.Ghost imaging can use detectors far below the signal bandwidth to receive information,which solves the problem of expanding the bandwidth of the signal by chip sequence.The chip sequence and the temporal patterns are used as keys to realize double encryption,which improves the security of information.Experiments verify this method's efficacy,and this method provides a new idea for the field of optical communication.
Keywords/Search Tags:Ghost imaging, Optical image encryption, Signal encryption, Information security
PDF Full Text Request
Related items