UM  > INSTITUTE OF APPLIED PHYSICS AND MATERIALS ENGINEERING
Residential Collegefalse
Status已發表Published
Optical ghost cryptography and steganography
Liu, H.; Chen, W.
2020-07-01
Source PublicationOptics and Lasers in Engineering
ISSN0143-8166
Pages106094-1-106094-5
AbstractAs an indirect imaging technique, computational ghost imaging (GI) obtains the object information by calculating the intensity correlation between a series of computer-generated matrices and the corresponding bucket signals, which thereby offers a potential application in optical encryption. Here, we propose a new steganography scheme, called ghost steganography, based on the principle of computational GI. In our ghost steganography scheme, the bucket intensity signals of a secret image are concealed into the ones of a non-secret image by applying a non-conspicuous number integration process. To further increase the security, we introduce RSA cryptography to encode the integrated bucket signals after the steganography process. Simulation and experiment results fully demonstrate the feasibility of our optical ghost cryptography and steganography scheme. Our work paves a way to the application of GI in steganography and also enriches the knowledge of symmetric and asymmetric optical cryptography.
Keywordghost imaging cryptography steganography
URLView the original
Language英語English
The Source to ArticlePB_Publication
PUB ID50669
Document TypeJournal article
CollectionINSTITUTE OF APPLIED PHYSICS AND MATERIALS ENGINEERING
Corresponding AuthorLiu, H.; Chen, W.
Recommended Citation
GB/T 7714
Liu, H.,Chen, W.. Optical ghost cryptography and steganography[J]. Optics and Lasers in Engineering, 2020, 106094-1-106094-5.
APA Liu, H.., & Chen, W. (2020). Optical ghost cryptography and steganography. Optics and Lasers in Engineering, 106094-1-106094-5.
MLA Liu, H.,et al."Optical ghost cryptography and steganography".Optics and Lasers in Engineering (2020):106094-1-106094-5.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Liu, H.]'s Articles
[Chen, W.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Liu, H.]'s Articles
[Chen, W.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Liu, H.]'s Articles
[Chen, W.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.