利用计算鬼影成像的光学图像认证和加密方案

IF 3.7 3区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS
{"title":"利用计算鬼影成像的光学图像认证和加密方案","authors":"","doi":"10.1016/j.jfranklin.2024.107203","DOIUrl":null,"url":null,"abstract":"<div><p>Most of the previous image encryption schemes overlook certifying the source of the encrypted images, thus the receiver may be misled by messages coming from unauthorized users or wrong sources. To simultaneously accomplish image encryption and source authentication of the encrypted images, an optical image authentication and encryption scheme is proposed by integrating computational ghost imaging (CGI) with quick response (QR) code. Firstly, the plaintext image is converted into a QR code and encrypted by a scrambling-diffusion structure. Then, the authentication image is enciphered by a CGI system and a diffusion structure. The intermediate resulting images are marked and embedded into the random matrices to withstand the differential attack. Moreover, the source of the encrypted images can be identified by the reconstructed authentication image and the nonlinear correlation coefficient (NCC) result. The authentication is considered successful if a sharp peak appears in the center of the NCC result. Numerical simulations show that the proposed scheme can not only withstand different attacks, but also avoid being misled by misinformation during the decryption process.</p></div>","PeriodicalId":17283,"journal":{"name":"Journal of The Franklin Institute-engineering and Applied Mathematics","volume":null,"pages":null},"PeriodicalIF":3.7000,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optical image authentication and encryption scheme with computational ghost imaging\",\"authors\":\"\",\"doi\":\"10.1016/j.jfranklin.2024.107203\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Most of the previous image encryption schemes overlook certifying the source of the encrypted images, thus the receiver may be misled by messages coming from unauthorized users or wrong sources. To simultaneously accomplish image encryption and source authentication of the encrypted images, an optical image authentication and encryption scheme is proposed by integrating computational ghost imaging (CGI) with quick response (QR) code. Firstly, the plaintext image is converted into a QR code and encrypted by a scrambling-diffusion structure. Then, the authentication image is enciphered by a CGI system and a diffusion structure. The intermediate resulting images are marked and embedded into the random matrices to withstand the differential attack. Moreover, the source of the encrypted images can be identified by the reconstructed authentication image and the nonlinear correlation coefficient (NCC) result. The authentication is considered successful if a sharp peak appears in the center of the NCC result. Numerical simulations show that the proposed scheme can not only withstand different attacks, but also avoid being misled by misinformation during the decryption process.</p></div>\",\"PeriodicalId\":17283,\"journal\":{\"name\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-08-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0016003224006240\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of The Franklin Institute-engineering and Applied Mathematics","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0016003224006240","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

以往的图像加密方案大多忽略了对加密图像来源的认证,因此接收者可能会被来自未经授权的用户或错误来源的信息所误导。为了同时完成图像加密和加密图像的来源认证,本文提出了一种将计算鬼影成像(CGI)与快速响应码(QR 码)相结合的光学图像认证和加密方案。首先,将明文图像转换成 QR 码,并通过加扰-扩散结构进行加密。然后,通过 CGI 系统和扩散结构对验证图像进行加密。中间生成的图像被标记并嵌入随机矩阵,以抵御差分攻击。此外,加密图像的来源可以通过重建的认证图像和非线性相关系数(NCC)结果来识别。如果非线性相关系数结果的中心出现一个尖锐的峰值,则认证成功。数值模拟表明,所提出的方案不仅能抵御不同的攻击,还能避免在解密过程中被错误信息误导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Optical image authentication and encryption scheme with computational ghost imaging

Most of the previous image encryption schemes overlook certifying the source of the encrypted images, thus the receiver may be misled by messages coming from unauthorized users or wrong sources. To simultaneously accomplish image encryption and source authentication of the encrypted images, an optical image authentication and encryption scheme is proposed by integrating computational ghost imaging (CGI) with quick response (QR) code. Firstly, the plaintext image is converted into a QR code and encrypted by a scrambling-diffusion structure. Then, the authentication image is enciphered by a CGI system and a diffusion structure. The intermediate resulting images are marked and embedded into the random matrices to withstand the differential attack. Moreover, the source of the encrypted images can be identified by the reconstructed authentication image and the nonlinear correlation coefficient (NCC) result. The authentication is considered successful if a sharp peak appears in the center of the NCC result. Numerical simulations show that the proposed scheme can not only withstand different attacks, but also avoid being misled by misinformation during the decryption process.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
7.30
自引率
14.60%
发文量
586
审稿时长
6.9 months
期刊介绍: The Journal of The Franklin Institute has an established reputation for publishing high-quality papers in the field of engineering and applied mathematics. Its current focus is on control systems, complex networks and dynamic systems, signal processing and communications and their applications. All submitted papers are peer-reviewed. The Journal will publish original research papers and research review papers of substance. Papers and special focus issues are judged upon possible lasting value, which has been and continues to be the strength of the Journal of The Franklin Institute.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信