Paper
16 August 2024 Optical image encryption based on computational ghost imaging
Qilin Zhu, Shuang Xu, Yousheng Ke
Author Affiliations +
Proceedings Volume 13231, 4th International Conference on Laser, Optics, and Optoelectronic Technology (LOPET 2024); 132312F (2024) https://doi.org/10.1117/12.3039995
Event: Fourth International Conference on Laser, Optics, and Optoelectronic Technology (LOPET 2024), 2024, Chongqing, China
Abstract
This paper proposes an optical image encryption method based on RNA encoding and computational ghost imaging. Four sets of random sequences obtained from Chen's hyperchaotic system are used to construct the speckle matrix required for calculating the ghost imaging system. The initial values of the hyper chaotic system is provided by encrypted images, by which one image corresponds to one encryption is achieved. RNA codons are used to encode and calculate the chaotic sequence, increasing the key space and improving the security of the system. The speckle matrix and target image are inputted into the computational ghost imaging system, as RNA encoding and codon substitution on the image received by the barrel detector are performed to obtain an encrypted image. This method effectively reduces the size of transmitted keys, improves transmission efficiency, and enhances the security of the system. It has certain reference and reference significance for optical based image transmission and encryption.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Qilin Zhu, Shuang Xu, and Yousheng Ke "Optical image encryption based on computational ghost imaging", Proc. SPIE 13231, 4th International Conference on Laser, Optics, and Optoelectronic Technology (LOPET 2024), 132312F (16 August 2024); https://doi.org/10.1117/12.3039995
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Speckle

Image encryption

Complex systems

Imaging systems

Computer security

Matrices

Optical image encryption

Back to Top