Information Security Scheme Based on Computational Temporal Ghost Imaging

24Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.

Cite

CITATION STYLE

APA

Jiang, S., Wang, Y., Long, T., Meng, X., Yang, X., Shu, R., & Sun, B. (2017). Information Security Scheme Based on Computational Temporal Ghost Imaging. Scientific Reports, 7(1). https://doi.org/10.1038/s41598-017-07816-2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free