Optical image encryption and authentication scheme with computational ghost imaging

•A new optical image encryption and authentication scheme is proposed with the computational ghost imaging.•The problem of inherent linear defect and key management in computational ghost imaging encryption system is solved.•The dual-channel encryption method provides multi-layer protection for the...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Applied mathematical modelling Ročník 131; s. 49 - 66
Hlavní autori: Guo, Zhe, Chen, Su-Hua, Zhou, Ling, Gong, Li-Hua
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier Inc 01.07.2024
Predmet:
ISSN:0307-904X
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract •A new optical image encryption and authentication scheme is proposed with the computational ghost imaging.•The problem of inherent linear defect and key management in computational ghost imaging encryption system is solved.•The dual-channel encryption method provides multi-layer protection for the plaintext images. Considering the necessity of identity authentication in most scenarios, a dual-channel (digital channel and optical channel) image encryption and authentication algorithm with computational ghost imaging (CGI) is proposed. The entire encryption process is governed by the pseudo-random sequences obtained by the 4D chaotic system and the Logistic map. During the digital channel encryption, the confusion and diffusion of the plaintext image are achieved by random scrambling and DNA computing, respectively. To alleviate the burden of key transmission and storage in the CGI encryption system, the speckle measurement matrices are constructed with the pseudo-random numbers obtained by the Logistic map. Additionally, a nonlinear encryption operation is carried out to compensate the linear vulnerability of CGI encryption. In the optical encryption channel, the authentication image is first encrypted with the CGI method, followed by the secondary encryption of the intensity values recorded by a bucket detector to produce an intermediate ciphertext. The final encryption image is generated by merging the intermediate ciphertexts from both encryption channels. It is demonstrated that the proposed optical image encryption and authentication scheme with CGI provides satisfactory encryption and decryption effects and can effectively counteract the common attacks. Moreover, the scheme holds promising application prospects due to its authentication capability.
AbstractList •A new optical image encryption and authentication scheme is proposed with the computational ghost imaging.•The problem of inherent linear defect and key management in computational ghost imaging encryption system is solved.•The dual-channel encryption method provides multi-layer protection for the plaintext images. Considering the necessity of identity authentication in most scenarios, a dual-channel (digital channel and optical channel) image encryption and authentication algorithm with computational ghost imaging (CGI) is proposed. The entire encryption process is governed by the pseudo-random sequences obtained by the 4D chaotic system and the Logistic map. During the digital channel encryption, the confusion and diffusion of the plaintext image are achieved by random scrambling and DNA computing, respectively. To alleviate the burden of key transmission and storage in the CGI encryption system, the speckle measurement matrices are constructed with the pseudo-random numbers obtained by the Logistic map. Additionally, a nonlinear encryption operation is carried out to compensate the linear vulnerability of CGI encryption. In the optical encryption channel, the authentication image is first encrypted with the CGI method, followed by the secondary encryption of the intensity values recorded by a bucket detector to produce an intermediate ciphertext. The final encryption image is generated by merging the intermediate ciphertexts from both encryption channels. It is demonstrated that the proposed optical image encryption and authentication scheme with CGI provides satisfactory encryption and decryption effects and can effectively counteract the common attacks. Moreover, the scheme holds promising application prospects due to its authentication capability.
Author Guo, Zhe
Chen, Su-Hua
Zhou, Ling
Gong, Li-Hua
Author_xml – sequence: 1
  givenname: Zhe
  surname: Guo
  fullname: Guo, Zhe
  organization: School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai 201620, China
– sequence: 2
  givenname: Su-Hua
  surname: Chen
  fullname: Chen, Su-Hua
  organization: Department of Electronic Information Engineering, Nanchang University, Nanchang 330031, China
– sequence: 3
  givenname: Ling
  surname: Zhou
  fullname: Zhou, Ling
  organization: Department of Energy and Power Engineering, Guangxi Electrical Polytechnic Institute, Nanning 530007, China
– sequence: 4
  givenname: Li-Hua
  surname: Gong
  fullname: Gong, Li-Hua
  email: lhgong@sues.edu.cn
  organization: School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai 201620, China
BookMark eNp9kE1qwzAQhbVIoUnaA3TnC9gdSbbl0FUJ_YNAFm2hOyHL41ghlo2ktOT2VZKuuggMDPOYb5j3ZmRiB4uE3FHIKNDyfpupsc8YsDyDWJRNyBQ4iHQB-dc1mXm_BYAiTlPyvh6D0WqXmF5tMEGr3SEqg02UbRK1Dx3a48JJ8rrDHpMfE7pED_24Dyc90ptu8OF0w9jNDblq1c7j7V-fk8_np4_la7pav7wtH1epZgsR0qoqochbzstCVVSrEpWAosoZpwVA0yCquNHUokbeClq2db2o2kLwutTARMXnhJ7vajd477CVo4svuIOkII9JyK2MSchjEhJiURYZ8Y_R5uwiOGV2F8mHM4nR0rdBJ702MS9sjEMdZDOYC_QvNxR-Qw
CitedBy_id crossref_primary_10_1088_1402_4896_adab30
crossref_primary_10_1007_s11082_024_07367_7
crossref_primary_10_1016_j_optcom_2025_132240
crossref_primary_10_1007_s11227_025_06943_2
crossref_primary_10_1016_j_neucom_2025_130981
crossref_primary_10_1109_ACCESS_2024_3481230
crossref_primary_10_1364_OE_569272
crossref_primary_10_1007_s11071_024_10268_9
crossref_primary_10_1007_s11042_024_20575_3
crossref_primary_10_1016_j_knosys_2025_113804
crossref_primary_10_1016_j_optcom_2025_131992
crossref_primary_10_1038_s41598_025_95511_y
crossref_primary_10_1007_s11227_024_06624_6
crossref_primary_10_1088_1674_1056_adacc7
crossref_primary_10_1088_1402_4896_adbc29
crossref_primary_10_1002_spy2_70015
crossref_primary_10_1007_s11071_024_10331_5
crossref_primary_10_1007_s11071_024_10854_x
crossref_primary_10_1038_s41598_024_83943_x
crossref_primary_10_1016_j_csi_2025_103974
crossref_primary_10_1016_j_optlaseng_2024_108560
crossref_primary_10_1364_OE_558183
crossref_primary_10_3788_LOP250945
crossref_primary_10_1007_s10489_025_06414_4
crossref_primary_10_1016_j_optlastec_2024_111191
crossref_primary_10_14500_aro_12153
crossref_primary_10_1007_s11071_025_11079_2
crossref_primary_10_1016_j_matcom_2025_06_008
crossref_primary_10_1016_j_matcom_2025_06_009
crossref_primary_10_1016_j_eswa_2024_125468
crossref_primary_10_1109_ACCESS_2024_3462547
crossref_primary_10_1016_j_optlaseng_2025_109121
crossref_primary_10_1016_j_optlaseng_2025_109084
crossref_primary_10_3389_fcomp_2025_1522184
crossref_primary_10_1049_ipr2_13270
crossref_primary_10_1049_tje2_70038
crossref_primary_10_1016_j_optcom_2025_131960
crossref_primary_10_1007_s11227_025_07085_1
crossref_primary_10_1016_j_dsp_2025_105347
crossref_primary_10_1088_1674_1056_ad6257
crossref_primary_10_1016_j_neucom_2024_128834
crossref_primary_10_1088_1402_4896_adab9e
crossref_primary_10_1007_s12596_025_02743_2
crossref_primary_10_1007_s11128_025_04752_3
crossref_primary_10_1080_09500340_2024_2395982
crossref_primary_10_1007_s10586_025_05295_z
crossref_primary_10_3390_math13111781
crossref_primary_10_1016_j_matcom_2025_05_005
crossref_primary_10_1364_AO_568559
crossref_primary_10_1016_j_optcom_2025_132188
crossref_primary_10_1016_j_sigpro_2024_109816
crossref_primary_10_3390_electronics13132647
crossref_primary_10_1088_1674_1056_adca9f
crossref_primary_10_1080_1206212X_2024_2392168
crossref_primary_10_1088_1402_4896_ad49eb
crossref_primary_10_1109_ACCESS_2024_3447068
crossref_primary_10_1088_2040_8986_adbcc2
crossref_primary_10_1007_s11431_024_2980_x
crossref_primary_10_1016_j_vlsi_2025_102437
crossref_primary_10_1088_1402_4896_adfca7
crossref_primary_10_1016_j_matcom_2025_01_011
crossref_primary_10_1109_ACCESS_2025_3558943
crossref_primary_10_1016_j_eswa_2025_126620
crossref_primary_10_1007_s12596_024_02405_9
crossref_primary_10_1016_j_jestch_2025_102108
crossref_primary_10_1016_j_eswa_2025_127475
crossref_primary_10_1016_j_eswa_2025_127404
crossref_primary_10_1002_spy2_458
crossref_primary_10_1016_j_sigpro_2025_109949
crossref_primary_10_1016_j_swevo_2025_102163
crossref_primary_10_1117_1_JEI_34_1_013048
crossref_primary_10_1016_j_optcom_2025_132192
crossref_primary_10_1007_s00371_024_03674_y
crossref_primary_10_1016_j_vlsi_2024_102307
crossref_primary_10_1080_09500340_2024_2418371
crossref_primary_10_1016_j_cosrev_2025_100759
crossref_primary_10_1016_j_optlastec_2024_111380
crossref_primary_10_1080_03772063_2025_2541294
crossref_primary_10_1088_1402_4896_adcf5a
crossref_primary_10_1016_j_optlastec_2025_112498
crossref_primary_10_1016_j_optlaseng_2025_109304
crossref_primary_10_1007_s11071_025_11241_w
crossref_primary_10_1016_j_neucom_2024_128295
Cites_doi 10.1016/j.optlaseng.2021.106550
10.1080/09500340.2020.1733690
10.1109/TIT.2007.909108
10.1016/j.eswa.2023.122052
10.1016/j.asr.2021.01.018
10.1364/OL.20.000767
10.1016/j.acha.2008.07.002
10.1016/j.optlaseng.2021.106627
10.1007/s10589-013-9576-1
10.1364/OL.392424
10.1016/j.optlastec.2023.109665
10.1016/j.apm.2023.03.038
10.1007/s11128-021-03187-w
10.1016/j.sigpro.2023.109107
10.1016/j.optlaseng.2019.105828
10.1016/j.optlaseng.2021.106782
10.1109/TCSS.2022.3218883
10.1016/j.optcom.2015.12.013
10.1016/j.optlaseng.2021.106881
10.1016/j.ins.2022.01.042
10.1016/j.optcom.2015.09.039
10.1016/j.optlaseng.2020.106227
10.1016/j.optlastec.2021.107257
10.1007/s10773-022-05262-z
10.1016/j.chaos.2021.111117
10.1016/j.patrec.2021.11.025
10.1007/s11071-021-06276-8
10.1016/j.physa.2021.126793
10.1007/s11042-022-12554-3
10.1007/s11042-022-12595-8
10.1016/j.eswa.2022.118845
10.1016/j.optlaseng.2019.105995
10.1109/TIT.2009.2016006
10.1038/171737a0
10.1007/s11082-021-03406-9
10.1016/j.eswa.2022.117709
10.1016/j.optlastec.2022.107879
10.1016/j.optcom.2022.129190
10.1364/AO.446586
10.1016/j.optlastec.2022.109033
ContentType Journal Article
Copyright 2024 Elsevier Inc.
Copyright_xml – notice: 2024 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.apm.2024.04.012
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
EndPage 66
ExternalDocumentID 10_1016_j_apm_2024_04_012
S0307904X24001550
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
0SF
1B1
1RT
1~.
1~5
23M
4.4
457
4G.
5GY
5VS
6I.
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAFTH
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
ABAOU
ABEFU
ABFNM
ABMAC
ABVKL
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ADBBV
ADEZE
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AEXQZ
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AIEXJ
AIGVJ
AIKHN
AITUG
AJOXV
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
ARUGR
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
HZ~
IHE
IXB
J1W
JJJVA
KOM
LG9
LY7
M26
M41
MHUIS
MO0
MVM
N9A
NCXOZ
O-L
O9-
OAUVE
OK1
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SDF
SDG
SES
SEW
SPC
SPCBC
SST
SSW
SSZ
T5K
TN5
WH7
WUQ
XJT
XPP
ZMT
~02
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
ADVLN
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKYEP
ANKPU
APXCP
CITATION
EFKBS
EFLBG
~HD
ID FETCH-LOGICAL-c297t-886054f3365a81ca6ea70584231500ddeea860db7be3f716fbb98f573b6c02783
ISICitedReferencesCount 89
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001237937800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0307-904X
IngestDate Sat Nov 29 06:34:27 EST 2025
Tue Nov 18 22:26:58 EST 2025
Sat May 04 15:43:31 EDT 2024
IsPeerReviewed true
IsScholarly true
Keywords Chaotic system
Optical image encryption
Authentication
Computational ghost imaging
DNA computing
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c297t-886054f3365a81ca6ea70584231500ddeea860db7be3f716fbb98f573b6c02783
PageCount 18
ParticipantIDs crossref_primary_10_1016_j_apm_2024_04_012
crossref_citationtrail_10_1016_j_apm_2024_04_012
elsevier_sciencedirect_doi_10_1016_j_apm_2024_04_012
PublicationCentury 2000
PublicationDate July 2024
2024-07-00
PublicationDateYYYYMMDD 2024-07-01
PublicationDate_xml – month: 07
  year: 2024
  text: July 2024
PublicationDecade 2020
PublicationTitle Applied mathematical modelling
PublicationYear 2024
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Wen, Fan, Zhang (bib0001) 2023; 10
Wang, Wang, Xu (bib0036) 2020; 128
Hamadi, Jamal, Mousa (bib0025) 2022; 54
Sang, Sang, Alam (bib0011) 2022; 153
Elkandoz, Alexan (bib0008) 2022; 81
Naim, Pacha, Serief (bib0038) 2021; 67
Gong, Luo (bib0006) 2023; 167
Wang, Guan, Yang (bib0013) 2021; 150
Xu, Li, Guo (bib0034) 2023; 537
Zhang, Zhang (bib0005) 2022; 81
Zhou, Hu, Huang (bib0012) 2024; 238
Zhou, Tong, Zou (bib0009) 2023; 211
Ye, Wu, Liu (bib0016) 2022; 205
Yuan, Yao, Liu (bib0033) 2016; 365
Ma, Mou, Xiong (bib0019) 2021; 103
Yuan, Wang, Liu (bib0032) 2020; 45
Needell, Tropp (bib0040) 2009; 26
Kumar, Nishchal (bib0021) 2019; 45
Su, Xu, Li (bib0024) 2021; 140
Wei, Wang (bib0022) 2021; 142
Ahmad, Agarwal, Alkhayyat (bib0004) 2022; 592
Huang, Zhou (bib0017) 2022; 149
Liang, Zhu (bib0014) 2023; 160
Li, Yin, Jiang (bib0043) 2013; 56
Yu, Dai, Liu (bib0003) 2023; 62
Refregier, Javidi (bib0020) 1995; 20
Tropp, Gilbert (bib0042) 2007; 53
Liu, Tong, Wang (bib0010) 2023; 120
Ghanbari-Ghalehjoughi, Eslami, Ahmadi-Kandjani (bib0029) 2020; 134
Wang, Xiong, Alfalou (bib0026) 2020; 124
Duan, Zhou, Gong (bib0037) 2022; 150
Dai, Ma, Zhou (bib0015) 2021; 20
Wu, Xie, Liu (bib0028) 2016; 359
Yang, Yuan, Li (bib0031) 2022; 24
Dai, Milenkovic (bib0041) 2009; 55
Sui, Pang, Cheng (bib0030) 2021; 143
Hazer, Yıldırım (bib0023) 2022; 61
Zhou, Wang, Wang (bib0002) 2022; 149
Lai, Hu, Erkan (bib0007) 2023; 213
Gong, Luo, Wu (bib0018) 2022; 591
Su, Wang, Wang (bib0027) 2022; 254
Tao, Yang, Meng (bib0035) 2020; 67
Watson, Crick (bib0039) 1953; 171
Liang (10.1016/j.apm.2024.04.012_bib0014) 2023; 160
Hamadi (10.1016/j.apm.2024.04.012_bib0025) 2022; 54
Zhang (10.1016/j.apm.2024.04.012_bib0005) 2022; 81
Duan (10.1016/j.apm.2024.04.012_bib0037) 2022; 150
Elkandoz (10.1016/j.apm.2024.04.012_bib0008) 2022; 81
Lai (10.1016/j.apm.2024.04.012_bib0007) 2023; 213
Su (10.1016/j.apm.2024.04.012_bib0024) 2021; 140
Ahmad (10.1016/j.apm.2024.04.012_bib0004) 2022; 592
Yuan (10.1016/j.apm.2024.04.012_bib0032) 2020; 45
Zhou (10.1016/j.apm.2024.04.012_bib0012) 2024; 238
Sui (10.1016/j.apm.2024.04.012_bib0030) 2021; 143
Needell (10.1016/j.apm.2024.04.012_bib0040) 2009; 26
Xu (10.1016/j.apm.2024.04.012_bib0034) 2023; 537
Su (10.1016/j.apm.2024.04.012_bib0027) 2022; 254
Watson (10.1016/j.apm.2024.04.012_bib0039) 1953; 171
Gong (10.1016/j.apm.2024.04.012_bib0006) 2023; 167
Tropp (10.1016/j.apm.2024.04.012_bib0042) 2007; 53
Kumar (10.1016/j.apm.2024.04.012_bib0021) 2019; 45
Tao (10.1016/j.apm.2024.04.012_bib0035) 2020; 67
Wang (10.1016/j.apm.2024.04.012_bib0026) 2020; 124
Ye (10.1016/j.apm.2024.04.012_bib0016) 2022; 205
Gong (10.1016/j.apm.2024.04.012_bib0018) 2022; 591
Zhou (10.1016/j.apm.2024.04.012_bib0002) 2022; 149
Naim (10.1016/j.apm.2024.04.012_bib0038) 2021; 67
Li (10.1016/j.apm.2024.04.012_bib0043) 2013; 56
Refregier (10.1016/j.apm.2024.04.012_bib0020) 1995; 20
Wei (10.1016/j.apm.2024.04.012_bib0022) 2021; 142
Dai (10.1016/j.apm.2024.04.012_bib0041) 2009; 55
Yuan (10.1016/j.apm.2024.04.012_bib0033) 2016; 365
Wang (10.1016/j.apm.2024.04.012_bib0036) 2020; 128
Wang (10.1016/j.apm.2024.04.012_bib0013) 2021; 150
Dai (10.1016/j.apm.2024.04.012_bib0015) 2021; 20
Hazer (10.1016/j.apm.2024.04.012_bib0023) 2022; 61
Sang (10.1016/j.apm.2024.04.012_bib0011) 2022; 153
Zhou (10.1016/j.apm.2024.04.012_bib0009) 2023; 211
Liu (10.1016/j.apm.2024.04.012_bib0010) 2023; 120
Yu (10.1016/j.apm.2024.04.012_bib0003) 2023; 62
Ma (10.1016/j.apm.2024.04.012_bib0019) 2021; 103
Huang (10.1016/j.apm.2024.04.012_bib0017) 2022; 149
Ghanbari-Ghalehjoughi (10.1016/j.apm.2024.04.012_bib0029) 2020; 134
Wen (10.1016/j.apm.2024.04.012_bib0001) 2023; 10
Yang (10.1016/j.apm.2024.04.012_bib0031) 2022; 24
Wu (10.1016/j.apm.2024.04.012_bib0028) 2016; 359
References_xml – volume: 61
  start-page: 645
  year: 2022
  end-page: 652
  ident: bib0023
  article-title: Diffractive imaging and intermodulation based multiple image encryption
  publication-title: Appl. Optics
– volume: 153
  start-page: 59
  year: 2022
  end-page: 66
  ident: bib0011
  article-title: Image encryption based on logistic chaotic systems and deep autoencoder
  publication-title: Pattern Recogn. Lett.
– volume: 62
  start-page: 33
  year: 2023
  ident: bib0003
  article-title: Visually meaningful quantum color image encryption scheme based on measured alternate quantum walks and quantum Logistic mixed linear-nonlinear coupled mapping lattices
  publication-title: Int. J. Theor. Phys.
– volume: 592
  start-page: 1
  year: 2022
  end-page: 20
  ident: bib0004
  article-title: An image encryption algorithm based on new generalized fusion fractal structure
  publication-title: Inf. Sci.
– volume: 205
  year: 2022
  ident: bib0016
  article-title: Image encryption scheme based on blind signature and an improved Lorenz system
  publication-title: Expert Syst. Appl.
– volume: 143
  year: 2021
  ident: bib0030
  article-title: An optical image encryption based on computational ghost imaging with sparse reconstruction
  publication-title: Opt. Lasers Eng.
– volume: 167
  year: 2023
  ident: bib0006
  article-title: Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR
  publication-title: Opt. Laser Technol.
– volume: 359
  start-page: 38
  year: 2016
  end-page: 43
  ident: bib0028
  article-title: Multiple-image encryption based on computational ghost imaging
  publication-title: Opt. Commun.
– volume: 120
  start-page: 153
  year: 2023
  end-page: 174
  ident: bib0010
  article-title: A novel devaney chaotic map with uniform trajectory for color image encryption
  publication-title: Appl. Math. Model.
– volume: 103
  start-page: 2867
  year: 2021
  end-page: 2880
  ident: bib0019
  article-title: Dynamical analysis of a new chaotic system: asymmetric multistability, offset boosting control and circuit realization
  publication-title: Nonlinear Dyn.
– volume: 55
  start-page: 2230
  year: 2009
  end-page: 2249
  ident: bib0041
  article-title: Subspace pursuit for compressive sensing signal reconstruction
  publication-title: IEEE Trans. Inf. Theory
– volume: 213
  year: 2023
  ident: bib0007
  article-title: A novel pixel-split image encryption scheme based on 2D Salomon map
  publication-title: Expert Syst. Appl.
– volume: 149
  year: 2022
  ident: bib0017
  article-title: Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion
  publication-title: Opt. Laser Technol.
– volume: 81
  start-page: 25497
  year: 2022
  end-page: 25518
  ident: bib0008
  article-title: Image encryption based on a combination of multiple chaotic maps
  publication-title: Multimed. Tools Appl.
– volume: 160
  year: 2023
  ident: bib0014
  article-title: A new one-dimensional chaotic map for image encryption scheme based on random DNA coding
  publication-title: Opt. Laser Technol.
– volume: 537
  year: 2023
  ident: bib0034
  article-title: Computational ghost imaging with key-patterns for image encryption
  publication-title: Opt. Commun.
– volume: 128
  year: 2020
  ident: bib0036
  article-title: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm
  publication-title: Opt. Lasers Eng.
– volume: 53
  start-page: 4655
  year: 2007
  end-page: 4666
  ident: bib0042
  article-title: Signal recovery from random measurements via orthogonal matching pursuit
  publication-title: IEEE Trans. Inf. Theory
– volume: 45
  start-page: 35
  year: 2019
  end-page: 43
  ident: bib0021
  article-title: Quick response code and interference-based optical asymmetric cryptosystem
  publication-title: J. Inf. Secur. Appl.
– volume: 24
  year: 2022
  ident: bib0031
  article-title: An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding
  publication-title: J. Optics-UK
– volume: 67
  start-page: 2077
  year: 2021
  end-page: 2103
  ident: bib0038
  article-title: A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem
  publication-title: Adv. Space Res.
– volume: 54
  start-page: 33
  year: 2022
  ident: bib0025
  article-title: Image encryption based on computer generated hologram and Rossler chaotic system
  publication-title: Opt. Quant. Electron.
– volume: 20
  start-page: 246
  year: 2021
  ident: bib0015
  article-title: Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map
  publication-title: Quantum Inf. Process.
– volume: 134
  year: 2020
  ident: bib0029
  article-title: Multiple layer encryption and steganography via multi-channel ghost imaging
  publication-title: Opt. Lasers Eng.
– volume: 20
  start-page: 767
  year: 1995
  end-page: 769
  ident: bib0020
  article-title: Optical image encryption based on input plane and Fourier plane random encoding
  publication-title: Opt. Lett.
– volume: 142
  year: 2021
  ident: bib0022
  article-title: Optical multiple-image authentication and encryption based on phase retrieval and interference with sparsity constraints
  publication-title: Opt. Laser Technol.
– volume: 124
  year: 2020
  ident: bib0026
  article-title: Optical image authentication using spatially variant polarized beam and sparse phase sampling method
  publication-title: Opt. Lasers Eng.
– volume: 81
  start-page: 20021
  year: 2022
  end-page: 20042
  ident: bib0005
  article-title: Multiple-image encryption algorithm based on chaos and gene fusion
  publication-title: Multimed. Tools Appl.
– volume: 10
  start-page: 3169
  year: 2023
  end-page: 3180
  ident: bib0001
  article-title: APCAS: autonomous privacy control and authentication sharing in social networks
  publication-title: IEEE Trans. Comput. Soc. Syst.
– volume: 140
  year: 2021
  ident: bib0024
  article-title: Optical color image encryption based on fingerprint key and phase-shifting digital holography
  publication-title: Opt. Lasers Eng.
– volume: 254
  year: 2022
  ident: bib0027
  article-title: Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in Fresnel domain
  publication-title: Optik (Stuttg)
– volume: 26
  start-page: 301
  year: 2009
  end-page: 321
  ident: bib0040
  article-title: CoSaMP: iterative signal recovery from incomplete and inaccurate samples
  publication-title: Appl. Comput. Harmon. A
– volume: 150
  year: 2022
  ident: bib0037
  article-title: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method
  publication-title: Opt. Lasers Eng.
– volume: 211
  year: 2023
  ident: bib0009
  article-title: Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation
  publication-title: Signal Process.
– volume: 67
  start-page: 394
  year: 2020
  end-page: 404
  ident: bib0035
  article-title: Plaintext-related multiple-image encryption based on computational ghost imaging
  publication-title: J. Mod. Optic.
– volume: 171
  start-page: 737
  year: 1953
  end-page: 738
  ident: bib0039
  article-title: Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid
  publication-title: Nature
– volume: 591
  year: 2022
  ident: bib0018
  article-title: New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG
  publication-title: Physica A
– volume: 365
  start-page: 180
  year: 2016
  end-page: 185
  ident: bib0033
  article-title: Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging
  publication-title: Opt. Commun.
– volume: 149
  year: 2022
  ident: bib0002
  article-title: A new combination chaotic system and its application in a new bit-level image encryption scheme
  publication-title: Opt. Lasers Eng.
– volume: 56
  start-page: 507
  year: 2013
  end-page: 530
  ident: bib0043
  article-title: An efficient augmented Lagrangian method with applications to total variation minimization
  publication-title: Comput. Optim. Appl.
– volume: 150
  year: 2021
  ident: bib0013
  article-title: Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map
  publication-title: Chaos Soliton. Fract.
– volume: 45
  start-page: 3917
  year: 2020
  end-page: 3920
  ident: bib0032
  article-title: Forgery attack on optical encryption based on computational ghost imaging
  publication-title: Opt. Lett.
– volume: 238
  year: 2024
  ident: bib0012
  article-title: Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm
  publication-title: Expert Syst. Appl.
– volume: 140
  year: 2021
  ident: 10.1016/j.apm.2024.04.012_bib0024
  article-title: Optical color image encryption based on fingerprint key and phase-shifting digital holography
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2021.106550
– volume: 67
  start-page: 394
  issue: 5
  year: 2020
  ident: 10.1016/j.apm.2024.04.012_bib0035
  article-title: Plaintext-related multiple-image encryption based on computational ghost imaging
  publication-title: J. Mod. Optic.
  doi: 10.1080/09500340.2020.1733690
– volume: 53
  start-page: 4655
  issue: 12
  year: 2007
  ident: 10.1016/j.apm.2024.04.012_bib0042
  article-title: Signal recovery from random measurements via orthogonal matching pursuit
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2007.909108
– volume: 238
  year: 2024
  ident: 10.1016/j.apm.2024.04.012_bib0012
  article-title: Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2023.122052
– volume: 67
  start-page: 2077
  issue: 7
  year: 2021
  ident: 10.1016/j.apm.2024.04.012_bib0038
  article-title: A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem
  publication-title: Adv. Space Res.
  doi: 10.1016/j.asr.2021.01.018
– volume: 20
  start-page: 767
  issue: 7
  year: 1995
  ident: 10.1016/j.apm.2024.04.012_bib0020
  article-title: Optical image encryption based on input plane and Fourier plane random encoding
  publication-title: Opt. Lett.
  doi: 10.1364/OL.20.000767
– volume: 26
  start-page: 301
  issue: 3
  year: 2009
  ident: 10.1016/j.apm.2024.04.012_bib0040
  article-title: CoSaMP: iterative signal recovery from incomplete and inaccurate samples
  publication-title: Appl. Comput. Harmon. A
  doi: 10.1016/j.acha.2008.07.002
– volume: 143
  year: 2021
  ident: 10.1016/j.apm.2024.04.012_bib0030
  article-title: An optical image encryption based on computational ghost imaging with sparse reconstruction
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2021.106627
– volume: 56
  start-page: 507
  year: 2013
  ident: 10.1016/j.apm.2024.04.012_bib0043
  article-title: An efficient augmented Lagrangian method with applications to total variation minimization
  publication-title: Comput. Optim. Appl.
  doi: 10.1007/s10589-013-9576-1
– volume: 45
  start-page: 3917
  issue: 14
  year: 2020
  ident: 10.1016/j.apm.2024.04.012_bib0032
  article-title: Forgery attack on optical encryption based on computational ghost imaging
  publication-title: Opt. Lett.
  doi: 10.1364/OL.392424
– volume: 167
  year: 2023
  ident: 10.1016/j.apm.2024.04.012_bib0006
  article-title: Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2023.109665
– volume: 120
  start-page: 153
  year: 2023
  ident: 10.1016/j.apm.2024.04.012_bib0010
  article-title: A novel devaney chaotic map with uniform trajectory for color image encryption
  publication-title: Appl. Math. Model.
  doi: 10.1016/j.apm.2023.03.038
– volume: 20
  start-page: 246
  year: 2021
  ident: 10.1016/j.apm.2024.04.012_bib0015
  article-title: Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map
  publication-title: Quantum Inf. Process.
  doi: 10.1007/s11128-021-03187-w
– volume: 211
  year: 2023
  ident: 10.1016/j.apm.2024.04.012_bib0009
  article-title: Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2023.109107
– volume: 45
  start-page: 35
  year: 2019
  ident: 10.1016/j.apm.2024.04.012_bib0021
  article-title: Quick response code and interference-based optical asymmetric cryptosystem
  publication-title: J. Inf. Secur. Appl.
– volume: 124
  year: 2020
  ident: 10.1016/j.apm.2024.04.012_bib0026
  article-title: Optical image authentication using spatially variant polarized beam and sparse phase sampling method
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2019.105828
– volume: 149
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0002
  article-title: A new combination chaotic system and its application in a new bit-level image encryption scheme
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2021.106782
– volume: 10
  start-page: 3169
  issue: 6
  year: 2023
  ident: 10.1016/j.apm.2024.04.012_bib0001
  article-title: APCAS: autonomous privacy control and authentication sharing in social networks
  publication-title: IEEE Trans. Comput. Soc. Syst.
  doi: 10.1109/TCSS.2022.3218883
– volume: 365
  start-page: 180
  year: 2016
  ident: 10.1016/j.apm.2024.04.012_bib0033
  article-title: Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2015.12.013
– volume: 150
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0037
  article-title: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2021.106881
– volume: 592
  start-page: 1
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0004
  article-title: An image encryption algorithm based on new generalized fusion fractal structure
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.01.042
– volume: 359
  start-page: 38
  year: 2016
  ident: 10.1016/j.apm.2024.04.012_bib0028
  article-title: Multiple-image encryption based on computational ghost imaging
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2015.09.039
– volume: 134
  year: 2020
  ident: 10.1016/j.apm.2024.04.012_bib0029
  article-title: Multiple layer encryption and steganography via multi-channel ghost imaging
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2020.106227
– volume: 142
  year: 2021
  ident: 10.1016/j.apm.2024.04.012_bib0022
  article-title: Optical multiple-image authentication and encryption based on phase retrieval and interference with sparsity constraints
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2021.107257
– volume: 62
  start-page: 33
  issue: 2
  year: 2023
  ident: 10.1016/j.apm.2024.04.012_bib0003
  article-title: Visually meaningful quantum color image encryption scheme based on measured alternate quantum walks and quantum Logistic mixed linear-nonlinear coupled mapping lattices
  publication-title: Int. J. Theor. Phys.
  doi: 10.1007/s10773-022-05262-z
– volume: 150
  year: 2021
  ident: 10.1016/j.apm.2024.04.012_bib0013
  article-title: Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map
  publication-title: Chaos Soliton. Fract.
  doi: 10.1016/j.chaos.2021.111117
– volume: 153
  start-page: 59
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0011
  article-title: Image encryption based on logistic chaotic systems and deep autoencoder
  publication-title: Pattern Recogn. Lett.
  doi: 10.1016/j.patrec.2021.11.025
– volume: 103
  start-page: 2867
  year: 2021
  ident: 10.1016/j.apm.2024.04.012_bib0019
  article-title: Dynamical analysis of a new chaotic system: asymmetric multistability, offset boosting control and circuit realization
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-021-06276-8
– volume: 591
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0018
  article-title: New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG
  publication-title: Physica A
  doi: 10.1016/j.physa.2021.126793
– volume: 81
  start-page: 20021
  issue: 14
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0005
  article-title: Multiple-image encryption algorithm based on chaos and gene fusion
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-022-12554-3
– volume: 81
  start-page: 25497
  issue: 18
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0008
  article-title: Image encryption based on a combination of multiple chaotic maps
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-022-12595-8
– volume: 213
  year: 2023
  ident: 10.1016/j.apm.2024.04.012_bib0007
  article-title: A novel pixel-split image encryption scheme based on 2D Salomon map
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2022.118845
– volume: 128
  year: 2020
  ident: 10.1016/j.apm.2024.04.012_bib0036
  article-title: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2019.105995
– volume: 55
  start-page: 2230
  issue: 5
  year: 2009
  ident: 10.1016/j.apm.2024.04.012_bib0041
  article-title: Subspace pursuit for compressive sensing signal reconstruction
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2009.2016006
– volume: 171
  start-page: 737
  issue: 4356
  year: 1953
  ident: 10.1016/j.apm.2024.04.012_bib0039
  article-title: Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid
  publication-title: Nature
  doi: 10.1038/171737a0
– volume: 54
  start-page: 33
  issue: 1
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0025
  article-title: Image encryption based on computer generated hologram and Rossler chaotic system
  publication-title: Opt. Quant. Electron.
  doi: 10.1007/s11082-021-03406-9
– volume: 205
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0016
  article-title: Image encryption scheme based on blind signature and an improved Lorenz system
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2022.117709
– volume: 149
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0017
  article-title: Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2022.107879
– volume: 254
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0027
  article-title: Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in Fresnel domain
  publication-title: Optik (Stuttg)
– volume: 537
  year: 2023
  ident: 10.1016/j.apm.2024.04.012_bib0034
  article-title: Computational ghost imaging with key-patterns for image encryption
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2022.129190
– volume: 61
  start-page: 645
  issue: 2
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0023
  article-title: Diffractive imaging and intermodulation based multiple image encryption
  publication-title: Appl. Optics
  doi: 10.1364/AO.446586
– volume: 160
  year: 2023
  ident: 10.1016/j.apm.2024.04.012_bib0014
  article-title: A new one-dimensional chaotic map for image encryption scheme based on random DNA coding
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2022.109033
– volume: 24
  issue: 6
  year: 2022
  ident: 10.1016/j.apm.2024.04.012_bib0031
  article-title: An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding
  publication-title: J. Optics-UK
SSID ssj0005904
Score 2.6349616
Snippet •A new optical image encryption and authentication scheme is proposed with the computational ghost imaging.•The problem of inherent linear defect and key...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 49
SubjectTerms Authentication
Chaotic system
Computational ghost imaging
DNA computing
Optical image encryption
Title Optical image encryption and authentication scheme with computational ghost imaging
URI https://dx.doi.org/10.1016/j.apm.2024.04.012
Volume 131
WOSCitedRecordID wos001237937800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 0307-904X
  databaseCode: AIEXJ
  dateStart: 20211207
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0005904
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3da9swEBdbu4ftYeyTdluHHvrU4qFY8tdjCC3d6NpBWgh9Mf6Ql5TGDUlc2v9-d9JJWdZtbINBMMFIltH9ON2df3fH2G5dxXWjehmyxEUA2k8FJRjGQSp1AwdUUejUJAofJycn6WiUfaGA_sK0E0jaNr29zWb_VdRwD4SNqbN_IW7_ULgB_0HocAWxw_WPBH86s-HpyRTpOPBm8zurFkxZViS0t0sK1O2Da6un2vHPsb-Diw1-xewP8wx3trlStWS2Tn29V8w_wX46V24k0nk6E4K9GHvcDCgNZNgFR50_Cy7G1x2FBlZziSV8PPEjKSwRKk9hpViZy5dZo3OakpSZsJxMr3_pGLAa1BYwpbPYNmS5p-VtwOHyQzHDWgKhMsVqiY29Xjx7iCvigkiVRW_sIdsMkygD_bfZ_3gw-rSiA2VCuaKZOMF9ATdcwB8W-rkN851dcvaMPSWHgvctEJ6zB7p9wZ589tJZvGRDggQ3kOArSHCABF-HBLeQ4AgJvgYJbiDBCRKv2PnhwdngKKBmGkEVZskySFNwXFUjZRwVaa8qYl0kAqxPsO8jIeCQ0wWMqMuk1LIBJ7opyyxtokSWcYVfp-VrttFet3qLcV3Hug5FXBcSnHtdlWDTYBmhUEalkqraZsJtT15RpXlseHKVO0rhZQ47muOO5gJ-vXCb7fkpM1tm5XeDldvznOxEa__lAJBfT3vzb9PesscrfL9jG8t5p3fYo-pmOVnM3xOMvgHbgI3A
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optical+image+encryption+and+authentication+scheme+with+computational+ghost+imaging&rft.jtitle=Applied+mathematical+modelling&rft.au=Guo%2C+Zhe&rft.au=Chen%2C+Su-Hua&rft.au=Zhou%2C+Ling&rft.au=Gong%2C+Li-Hua&rft.date=2024-07-01&rft.pub=Elsevier+Inc&rft.issn=0307-904X&rft.volume=131&rft.spage=49&rft.epage=66&rft_id=info:doi/10.1016%2Fj.apm.2024.04.012&rft.externalDocID=S0307904X24001550
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0307-904X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0307-904X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0307-904X&client=summon