{"title":"利用计算鬼影成像的光学图像认证和加密方案","authors":"","doi":"10.1016/j.jfranklin.2024.107203","DOIUrl":null,"url":null,"abstract":"<div><p>Most of the previous image encryption schemes overlook certifying the source of the encrypted images, thus the receiver may be misled by messages coming from unauthorized users or wrong sources. To simultaneously accomplish image encryption and source authentication of the encrypted images, an optical image authentication and encryption scheme is proposed by integrating computational ghost imaging (CGI) with quick response (QR) code. Firstly, the plaintext image is converted into a QR code and encrypted by a scrambling-diffusion structure. Then, the authentication image is enciphered by a CGI system and a diffusion structure. The intermediate resulting images are marked and embedded into the random matrices to withstand the differential attack. Moreover, the source of the encrypted images can be identified by the reconstructed authentication image and the nonlinear correlation coefficient (NCC) result. The authentication is considered successful if a sharp peak appears in the center of the NCC result. Numerical simulations show that the proposed scheme can not only withstand different attacks, but also avoid being misled by misinformation during the decryption process.</p></div>","PeriodicalId":17283,"journal":{"name":"Journal of The Franklin Institute-engineering and Applied Mathematics","volume":null,"pages":null},"PeriodicalIF":3.7000,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optical image authentication and encryption scheme with computational ghost imaging\",\"authors\":\"\",\"doi\":\"10.1016/j.jfranklin.2024.107203\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Most of the previous image encryption schemes overlook certifying the source of the encrypted images, thus the receiver may be misled by messages coming from unauthorized users or wrong sources. To simultaneously accomplish image encryption and source authentication of the encrypted images, an optical image authentication and encryption scheme is proposed by integrating computational ghost imaging (CGI) with quick response (QR) code. Firstly, the plaintext image is converted into a QR code and encrypted by a scrambling-diffusion structure. Then, the authentication image is enciphered by a CGI system and a diffusion structure. The intermediate resulting images are marked and embedded into the random matrices to withstand the differential attack. Moreover, the source of the encrypted images can be identified by the reconstructed authentication image and the nonlinear correlation coefficient (NCC) result. The authentication is considered successful if a sharp peak appears in the center of the NCC result. Numerical simulations show that the proposed scheme can not only withstand different attacks, but also avoid being misled by misinformation during the decryption process.</p></div>\",\"PeriodicalId\":17283,\"journal\":{\"name\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-08-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of The Franklin Institute-engineering and Applied Mathematics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0016003224006240\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of The Franklin Institute-engineering and Applied Mathematics","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0016003224006240","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
以往的图像加密方案大多忽略了对加密图像来源的认证,因此接收者可能会被来自未经授权的用户或错误来源的信息所误导。为了同时完成图像加密和加密图像的来源认证,本文提出了一种将计算鬼影成像(CGI)与快速响应码(QR 码)相结合的光学图像认证和加密方案。首先,将明文图像转换成 QR 码,并通过加扰-扩散结构进行加密。然后,通过 CGI 系统和扩散结构对验证图像进行加密。中间生成的图像被标记并嵌入随机矩阵,以抵御差分攻击。此外,加密图像的来源可以通过重建的认证图像和非线性相关系数(NCC)结果来识别。如果非线性相关系数结果的中心出现一个尖锐的峰值,则认证成功。数值模拟表明,所提出的方案不仅能抵御不同的攻击,还能避免在解密过程中被错误信息误导。
Optical image authentication and encryption scheme with computational ghost imaging
Most of the previous image encryption schemes overlook certifying the source of the encrypted images, thus the receiver may be misled by messages coming from unauthorized users or wrong sources. To simultaneously accomplish image encryption and source authentication of the encrypted images, an optical image authentication and encryption scheme is proposed by integrating computational ghost imaging (CGI) with quick response (QR) code. Firstly, the plaintext image is converted into a QR code and encrypted by a scrambling-diffusion structure. Then, the authentication image is enciphered by a CGI system and a diffusion structure. The intermediate resulting images are marked and embedded into the random matrices to withstand the differential attack. Moreover, the source of the encrypted images can be identified by the reconstructed authentication image and the nonlinear correlation coefficient (NCC) result. The authentication is considered successful if a sharp peak appears in the center of the NCC result. Numerical simulations show that the proposed scheme can not only withstand different attacks, but also avoid being misled by misinformation during the decryption process.
期刊介绍:
The Journal of The Franklin Institute has an established reputation for publishing high-quality papers in the field of engineering and applied mathematics. Its current focus is on control systems, complex networks and dynamic systems, signal processing and communications and their applications. All submitted papers are peer-reviewed. The Journal will publish original research papers and research review papers of substance. Papers and special focus issues are judged upon possible lasting value, which has been and continues to be the strength of the Journal of The Franklin Institute.