Font Size: a A A

Research On Optical Information Security Technique Based On QR Code And Computational Ghost Imaging

Posted on:2024-08-19Degree:MasterType:Thesis
Country:ChinaCandidate:M WangFull Text:PDF
GTID:2530306923472104Subject:Optical Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology and communication technology,information transmission is becoming more and more convenient.In the process of information exchange and intercommunication,information security issues have attracted close attention.As an important branch in the field of information security,optical information security has developed rapidly with its advantages of multi-dimension and large capacity.However,the traditional optical encryption technology tends to encrypt the image into a complex matrix,which brings a certain pressure to the storage of ciphertext,and there are problems of poor reconstruction quality and low security in the decryption process of the image.Therefore,how to build a high quality and high security optical information security system is an important problem to be solved.As a new technology,computational ghost imaging(CGI)can encrypt the target image into light intensity values instead of the complex matrix,which reduces the storage space of ciphertext QR code has good error correction ability,and even if the code is damaged,it can recover the image within its error correction range,improving the quality of image reconstruction.Based on CGI and QR code,this thesis proposes a series of optical image encryption and authentication schemes by combining chaotic scrambling,RSA public-key cryptography and other methods.The main work and innovation of this thesis are as follows:1.An optical identity authentication scheme based on QR code and Hadamard ghost imaging is proposed.After Lorenz chaotic scrambling and QR encoding are performed on the target image,the generated QR code is encrypted by Hadamard ghost imaging system to complete the collection of the initial ciphertext.Arnold transform is applied to the initial ciphertext to obtain the final ciphertext of the system.The authenticator decrypts the ciphertext with the keys,and determines whether the authentication is successful by calculating the nonlinear correlation coefficient between the system output image and the standard authentication image.Hadamard ghost imaging uses Hadamard matrix to replace the random matrix of traditional ghost imaging,which solves the problems of long reconstruction time and poor quality of traditional ghost imaging.Lorenz chaotic scrambling and Arnold scrambling methods realize multiple encryption of image information and improve the security of authentication system2.A multi-image encryption scheme based on QR code and singular value decomposition ghost imaging(SVDGI)is proposed.This method combines multiple images into one image through Exclusive OR(XOR)operation,achieving the purpose of encrypting multiple images simultaneously.In the process of encryption and decryption of SVDGI,the singular value decomposition transform is used to construct the measurement matrix,and the image can be reconstructed after one-step transpose,which shortens the time of image reconstruction.The combination of SVDGI and QR code makes the images complete the high-quality reconstruction with correlation coefficient of 1 in fewer measurement times,and effectively improves the efficiency of image reconstruction.Logistic key,XOR key and measurement matrix key can be transmitted as system keys.During the decryption process,any key error cannot decrypt the target images successfully,which ensures the sensitivity of the encryption system to the keys.3.A multi-image encryption scheme based on singular value decomposition ghost imaging and RSA public-key cryptography is proposed.The traditional optical image encryption system is usually a symmetric cryptographic system,the encryption key and decryption key are the same,the key management and distribution are difficult,and the system security is low.To solve this problem,on the basis of multi-image encryption system based on QR code and SVDGI,the RSA public-key cryptography is introduced.The public key generated by the RSA algorithm encrypts the keys during the encryption process.Only the receiver with the private key of RSA algorithm can successfully extract the keys and then reconstruct the desired target images.This scheme combines symmetric cryptosystem with asymmetric cryptosystem,realizes double encryption of target images and keys,and improves the security of the system...
Keywords/Search Tags:Optical image encryption, Optical image authentication, Computational ghost imaging, QR code, RSA public-key cryptography
PDF Full Text Request
Related items