Optical image encryption and authentication scheme with computational ghost imaging
•A new optical image encryption and authentication scheme is proposed with the computational ghost imaging.•The problem of inherent linear defect and key management in computational ghost imaging encryption system is solved.•The dual-channel encryption method provides multi-layer protection for the...
Uložené v:
| Vydané v: | Applied mathematical modelling Ročník 131; s. 49 - 66 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier Inc
01.07.2024
|
| Predmet: | |
| ISSN: | 0307-904X |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | •A new optical image encryption and authentication scheme is proposed with the computational ghost imaging.•The problem of inherent linear defect and key management in computational ghost imaging encryption system is solved.•The dual-channel encryption method provides multi-layer protection for the plaintext images.
Considering the necessity of identity authentication in most scenarios, a dual-channel (digital channel and optical channel) image encryption and authentication algorithm with computational ghost imaging (CGI) is proposed. The entire encryption process is governed by the pseudo-random sequences obtained by the 4D chaotic system and the Logistic map. During the digital channel encryption, the confusion and diffusion of the plaintext image are achieved by random scrambling and DNA computing, respectively. To alleviate the burden of key transmission and storage in the CGI encryption system, the speckle measurement matrices are constructed with the pseudo-random numbers obtained by the Logistic map. Additionally, a nonlinear encryption operation is carried out to compensate the linear vulnerability of CGI encryption. In the optical encryption channel, the authentication image is first encrypted with the CGI method, followed by the secondary encryption of the intensity values recorded by a bucket detector to produce an intermediate ciphertext. The final encryption image is generated by merging the intermediate ciphertexts from both encryption channels. It is demonstrated that the proposed optical image encryption and authentication scheme with CGI provides satisfactory encryption and decryption effects and can effectively counteract the common attacks. Moreover, the scheme holds promising application prospects due to its authentication capability. |
|---|---|
| AbstractList | •A new optical image encryption and authentication scheme is proposed with the computational ghost imaging.•The problem of inherent linear defect and key management in computational ghost imaging encryption system is solved.•The dual-channel encryption method provides multi-layer protection for the plaintext images.
Considering the necessity of identity authentication in most scenarios, a dual-channel (digital channel and optical channel) image encryption and authentication algorithm with computational ghost imaging (CGI) is proposed. The entire encryption process is governed by the pseudo-random sequences obtained by the 4D chaotic system and the Logistic map. During the digital channel encryption, the confusion and diffusion of the plaintext image are achieved by random scrambling and DNA computing, respectively. To alleviate the burden of key transmission and storage in the CGI encryption system, the speckle measurement matrices are constructed with the pseudo-random numbers obtained by the Logistic map. Additionally, a nonlinear encryption operation is carried out to compensate the linear vulnerability of CGI encryption. In the optical encryption channel, the authentication image is first encrypted with the CGI method, followed by the secondary encryption of the intensity values recorded by a bucket detector to produce an intermediate ciphertext. The final encryption image is generated by merging the intermediate ciphertexts from both encryption channels. It is demonstrated that the proposed optical image encryption and authentication scheme with CGI provides satisfactory encryption and decryption effects and can effectively counteract the common attacks. Moreover, the scheme holds promising application prospects due to its authentication capability. |
| Author | Guo, Zhe Chen, Su-Hua Zhou, Ling Gong, Li-Hua |
| Author_xml | – sequence: 1 givenname: Zhe surname: Guo fullname: Guo, Zhe organization: School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai 201620, China – sequence: 2 givenname: Su-Hua surname: Chen fullname: Chen, Su-Hua organization: Department of Electronic Information Engineering, Nanchang University, Nanchang 330031, China – sequence: 3 givenname: Ling surname: Zhou fullname: Zhou, Ling organization: Department of Energy and Power Engineering, Guangxi Electrical Polytechnic Institute, Nanning 530007, China – sequence: 4 givenname: Li-Hua surname: Gong fullname: Gong, Li-Hua email: lhgong@sues.edu.cn organization: School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai 201620, China |
| BookMark | eNp9kE1qwzAQhbVIoUnaA3TnC9gdSbbl0FUJ_YNAFm2hOyHL41ghlo2ktOT2VZKuuggMDPOYb5j3ZmRiB4uE3FHIKNDyfpupsc8YsDyDWJRNyBQ4iHQB-dc1mXm_BYAiTlPyvh6D0WqXmF5tMEGr3SEqg02UbRK1Dx3a48JJ8rrDHpMfE7pED_24Dyc90ptu8OF0w9jNDblq1c7j7V-fk8_np4_la7pav7wtH1epZgsR0qoqochbzstCVVSrEpWAosoZpwVA0yCquNHUokbeClq2db2o2kLwutTARMXnhJ7vajd477CVo4svuIOkII9JyK2MSchjEhJiURYZ8Y_R5uwiOGV2F8mHM4nR0rdBJ702MS9sjEMdZDOYC_QvNxR-Qw |
| CitedBy_id | crossref_primary_10_1088_1402_4896_adab30 crossref_primary_10_1007_s11082_024_07367_7 crossref_primary_10_1016_j_optcom_2025_132240 crossref_primary_10_1007_s11227_025_06943_2 crossref_primary_10_1016_j_neucom_2025_130981 crossref_primary_10_1109_ACCESS_2024_3481230 crossref_primary_10_1364_OE_569272 crossref_primary_10_1007_s11071_024_10268_9 crossref_primary_10_1007_s11042_024_20575_3 crossref_primary_10_1016_j_knosys_2025_113804 crossref_primary_10_1016_j_optcom_2025_131992 crossref_primary_10_1038_s41598_025_95511_y crossref_primary_10_1007_s11227_024_06624_6 crossref_primary_10_1088_1674_1056_adacc7 crossref_primary_10_1088_1402_4896_adbc29 crossref_primary_10_1002_spy2_70015 crossref_primary_10_1007_s11071_024_10331_5 crossref_primary_10_1007_s11071_024_10854_x crossref_primary_10_1038_s41598_024_83943_x crossref_primary_10_1016_j_csi_2025_103974 crossref_primary_10_1016_j_optlaseng_2024_108560 crossref_primary_10_1364_OE_558183 crossref_primary_10_3788_LOP250945 crossref_primary_10_1007_s10489_025_06414_4 crossref_primary_10_1016_j_optlastec_2024_111191 crossref_primary_10_14500_aro_12153 crossref_primary_10_1007_s11071_025_11079_2 crossref_primary_10_1016_j_matcom_2025_06_008 crossref_primary_10_1016_j_matcom_2025_06_009 crossref_primary_10_1016_j_eswa_2024_125468 crossref_primary_10_1109_ACCESS_2024_3462547 crossref_primary_10_1016_j_optlaseng_2025_109121 crossref_primary_10_1016_j_optlaseng_2025_109084 crossref_primary_10_3389_fcomp_2025_1522184 crossref_primary_10_1049_ipr2_13270 crossref_primary_10_1049_tje2_70038 crossref_primary_10_1016_j_optcom_2025_131960 crossref_primary_10_1007_s11227_025_07085_1 crossref_primary_10_1016_j_dsp_2025_105347 crossref_primary_10_1088_1674_1056_ad6257 crossref_primary_10_1016_j_neucom_2024_128834 crossref_primary_10_1088_1402_4896_adab9e crossref_primary_10_1007_s12596_025_02743_2 crossref_primary_10_1007_s11128_025_04752_3 crossref_primary_10_1080_09500340_2024_2395982 crossref_primary_10_1007_s10586_025_05295_z crossref_primary_10_3390_math13111781 crossref_primary_10_1016_j_matcom_2025_05_005 crossref_primary_10_1364_AO_568559 crossref_primary_10_1016_j_optcom_2025_132188 crossref_primary_10_1016_j_sigpro_2024_109816 crossref_primary_10_3390_electronics13132647 crossref_primary_10_1088_1674_1056_adca9f crossref_primary_10_1080_1206212X_2024_2392168 crossref_primary_10_1088_1402_4896_ad49eb crossref_primary_10_1109_ACCESS_2024_3447068 crossref_primary_10_1088_2040_8986_adbcc2 crossref_primary_10_1007_s11431_024_2980_x crossref_primary_10_1016_j_vlsi_2025_102437 crossref_primary_10_1088_1402_4896_adfca7 crossref_primary_10_1016_j_matcom_2025_01_011 crossref_primary_10_1109_ACCESS_2025_3558943 crossref_primary_10_1016_j_eswa_2025_126620 crossref_primary_10_1007_s12596_024_02405_9 crossref_primary_10_1016_j_jestch_2025_102108 crossref_primary_10_1016_j_eswa_2025_127475 crossref_primary_10_1016_j_eswa_2025_127404 crossref_primary_10_1002_spy2_458 crossref_primary_10_1016_j_sigpro_2025_109949 crossref_primary_10_1016_j_swevo_2025_102163 crossref_primary_10_1117_1_JEI_34_1_013048 crossref_primary_10_1016_j_optcom_2025_132192 crossref_primary_10_1007_s00371_024_03674_y crossref_primary_10_1016_j_vlsi_2024_102307 crossref_primary_10_1080_09500340_2024_2418371 crossref_primary_10_1016_j_cosrev_2025_100759 crossref_primary_10_1016_j_optlastec_2024_111380 crossref_primary_10_1080_03772063_2025_2541294 crossref_primary_10_1088_1402_4896_adcf5a crossref_primary_10_1016_j_optlastec_2025_112498 crossref_primary_10_1016_j_optlaseng_2025_109304 crossref_primary_10_1007_s11071_025_11241_w crossref_primary_10_1016_j_neucom_2024_128295 |
| Cites_doi | 10.1016/j.optlaseng.2021.106550 10.1080/09500340.2020.1733690 10.1109/TIT.2007.909108 10.1016/j.eswa.2023.122052 10.1016/j.asr.2021.01.018 10.1364/OL.20.000767 10.1016/j.acha.2008.07.002 10.1016/j.optlaseng.2021.106627 10.1007/s10589-013-9576-1 10.1364/OL.392424 10.1016/j.optlastec.2023.109665 10.1016/j.apm.2023.03.038 10.1007/s11128-021-03187-w 10.1016/j.sigpro.2023.109107 10.1016/j.optlaseng.2019.105828 10.1016/j.optlaseng.2021.106782 10.1109/TCSS.2022.3218883 10.1016/j.optcom.2015.12.013 10.1016/j.optlaseng.2021.106881 10.1016/j.ins.2022.01.042 10.1016/j.optcom.2015.09.039 10.1016/j.optlaseng.2020.106227 10.1016/j.optlastec.2021.107257 10.1007/s10773-022-05262-z 10.1016/j.chaos.2021.111117 10.1016/j.patrec.2021.11.025 10.1007/s11071-021-06276-8 10.1016/j.physa.2021.126793 10.1007/s11042-022-12554-3 10.1007/s11042-022-12595-8 10.1016/j.eswa.2022.118845 10.1016/j.optlaseng.2019.105995 10.1109/TIT.2009.2016006 10.1038/171737a0 10.1007/s11082-021-03406-9 10.1016/j.eswa.2022.117709 10.1016/j.optlastec.2022.107879 10.1016/j.optcom.2022.129190 10.1364/AO.446586 10.1016/j.optlastec.2022.109033 |
| ContentType | Journal Article |
| Copyright | 2024 Elsevier Inc. |
| Copyright_xml | – notice: 2024 Elsevier Inc. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.apm.2024.04.012 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Mathematics |
| EndPage | 66 |
| ExternalDocumentID | 10_1016_j_apm_2024_04_012 S0307904X24001550 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 0SF 1B1 1RT 1~. 1~5 23M 4.4 457 4G. 5GY 5VS 6I. 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO ABAOU ABEFU ABFNM ABMAC ABVKL ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ADBBV ADEZE ADMUD ADTZH AEBSH AECPX AEKER AENEX AEXQZ AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AIEXJ AIGVJ AIKHN AITUG AJOXV AKRWK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ARUGR ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 EBS EFJIC EJD EO8 EO9 EP2 EP3 F5P FDB FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA HZ~ IHE IXB J1W JJJVA KOM LG9 LY7 M26 M41 MHUIS MO0 MVM N9A NCXOZ O-L O9- OAUVE OK1 OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SDF SDG SES SEW SPC SPCBC SST SSW SSZ T5K TN5 WH7 WUQ XJT XPP ZMT ~02 ~G- 9DU AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO ADVLN AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKYEP ANKPU APXCP CITATION EFKBS EFLBG ~HD |
| ID | FETCH-LOGICAL-c297t-886054f3365a81ca6ea70584231500ddeea860db7be3f716fbb98f573b6c02783 |
| ISICitedReferencesCount | 89 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001237937800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0307-904X |
| IngestDate | Sat Nov 29 06:34:27 EST 2025 Tue Nov 18 22:26:58 EST 2025 Sat May 04 15:43:31 EDT 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Chaotic system Optical image encryption Authentication Computational ghost imaging DNA computing |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c297t-886054f3365a81ca6ea70584231500ddeea860db7be3f716fbb98f573b6c02783 |
| PageCount | 18 |
| ParticipantIDs | crossref_primary_10_1016_j_apm_2024_04_012 crossref_citationtrail_10_1016_j_apm_2024_04_012 elsevier_sciencedirect_doi_10_1016_j_apm_2024_04_012 |
| PublicationCentury | 2000 |
| PublicationDate | July 2024 2024-07-00 |
| PublicationDateYYYYMMDD | 2024-07-01 |
| PublicationDate_xml | – month: 07 year: 2024 text: July 2024 |
| PublicationDecade | 2020 |
| PublicationTitle | Applied mathematical modelling |
| PublicationYear | 2024 |
| Publisher | Elsevier Inc |
| Publisher_xml | – name: Elsevier Inc |
| References | Wen, Fan, Zhang (bib0001) 2023; 10 Wang, Wang, Xu (bib0036) 2020; 128 Hamadi, Jamal, Mousa (bib0025) 2022; 54 Sang, Sang, Alam (bib0011) 2022; 153 Elkandoz, Alexan (bib0008) 2022; 81 Naim, Pacha, Serief (bib0038) 2021; 67 Gong, Luo (bib0006) 2023; 167 Wang, Guan, Yang (bib0013) 2021; 150 Xu, Li, Guo (bib0034) 2023; 537 Zhang, Zhang (bib0005) 2022; 81 Zhou, Hu, Huang (bib0012) 2024; 238 Zhou, Tong, Zou (bib0009) 2023; 211 Ye, Wu, Liu (bib0016) 2022; 205 Yuan, Yao, Liu (bib0033) 2016; 365 Ma, Mou, Xiong (bib0019) 2021; 103 Yuan, Wang, Liu (bib0032) 2020; 45 Needell, Tropp (bib0040) 2009; 26 Kumar, Nishchal (bib0021) 2019; 45 Su, Xu, Li (bib0024) 2021; 140 Wei, Wang (bib0022) 2021; 142 Ahmad, Agarwal, Alkhayyat (bib0004) 2022; 592 Huang, Zhou (bib0017) 2022; 149 Liang, Zhu (bib0014) 2023; 160 Li, Yin, Jiang (bib0043) 2013; 56 Yu, Dai, Liu (bib0003) 2023; 62 Refregier, Javidi (bib0020) 1995; 20 Tropp, Gilbert (bib0042) 2007; 53 Liu, Tong, Wang (bib0010) 2023; 120 Ghanbari-Ghalehjoughi, Eslami, Ahmadi-Kandjani (bib0029) 2020; 134 Wang, Xiong, Alfalou (bib0026) 2020; 124 Duan, Zhou, Gong (bib0037) 2022; 150 Dai, Ma, Zhou (bib0015) 2021; 20 Wu, Xie, Liu (bib0028) 2016; 359 Yang, Yuan, Li (bib0031) 2022; 24 Dai, Milenkovic (bib0041) 2009; 55 Sui, Pang, Cheng (bib0030) 2021; 143 Hazer, Yıldırım (bib0023) 2022; 61 Zhou, Wang, Wang (bib0002) 2022; 149 Lai, Hu, Erkan (bib0007) 2023; 213 Gong, Luo, Wu (bib0018) 2022; 591 Su, Wang, Wang (bib0027) 2022; 254 Tao, Yang, Meng (bib0035) 2020; 67 Watson, Crick (bib0039) 1953; 171 Liang (10.1016/j.apm.2024.04.012_bib0014) 2023; 160 Hamadi (10.1016/j.apm.2024.04.012_bib0025) 2022; 54 Zhang (10.1016/j.apm.2024.04.012_bib0005) 2022; 81 Duan (10.1016/j.apm.2024.04.012_bib0037) 2022; 150 Elkandoz (10.1016/j.apm.2024.04.012_bib0008) 2022; 81 Lai (10.1016/j.apm.2024.04.012_bib0007) 2023; 213 Su (10.1016/j.apm.2024.04.012_bib0024) 2021; 140 Ahmad (10.1016/j.apm.2024.04.012_bib0004) 2022; 592 Yuan (10.1016/j.apm.2024.04.012_bib0032) 2020; 45 Zhou (10.1016/j.apm.2024.04.012_bib0012) 2024; 238 Sui (10.1016/j.apm.2024.04.012_bib0030) 2021; 143 Needell (10.1016/j.apm.2024.04.012_bib0040) 2009; 26 Xu (10.1016/j.apm.2024.04.012_bib0034) 2023; 537 Su (10.1016/j.apm.2024.04.012_bib0027) 2022; 254 Watson (10.1016/j.apm.2024.04.012_bib0039) 1953; 171 Gong (10.1016/j.apm.2024.04.012_bib0006) 2023; 167 Tropp (10.1016/j.apm.2024.04.012_bib0042) 2007; 53 Kumar (10.1016/j.apm.2024.04.012_bib0021) 2019; 45 Tao (10.1016/j.apm.2024.04.012_bib0035) 2020; 67 Wang (10.1016/j.apm.2024.04.012_bib0026) 2020; 124 Ye (10.1016/j.apm.2024.04.012_bib0016) 2022; 205 Gong (10.1016/j.apm.2024.04.012_bib0018) 2022; 591 Zhou (10.1016/j.apm.2024.04.012_bib0002) 2022; 149 Naim (10.1016/j.apm.2024.04.012_bib0038) 2021; 67 Li (10.1016/j.apm.2024.04.012_bib0043) 2013; 56 Refregier (10.1016/j.apm.2024.04.012_bib0020) 1995; 20 Wei (10.1016/j.apm.2024.04.012_bib0022) 2021; 142 Dai (10.1016/j.apm.2024.04.012_bib0041) 2009; 55 Yuan (10.1016/j.apm.2024.04.012_bib0033) 2016; 365 Wang (10.1016/j.apm.2024.04.012_bib0036) 2020; 128 Wang (10.1016/j.apm.2024.04.012_bib0013) 2021; 150 Dai (10.1016/j.apm.2024.04.012_bib0015) 2021; 20 Hazer (10.1016/j.apm.2024.04.012_bib0023) 2022; 61 Sang (10.1016/j.apm.2024.04.012_bib0011) 2022; 153 Zhou (10.1016/j.apm.2024.04.012_bib0009) 2023; 211 Liu (10.1016/j.apm.2024.04.012_bib0010) 2023; 120 Yu (10.1016/j.apm.2024.04.012_bib0003) 2023; 62 Ma (10.1016/j.apm.2024.04.012_bib0019) 2021; 103 Huang (10.1016/j.apm.2024.04.012_bib0017) 2022; 149 Ghanbari-Ghalehjoughi (10.1016/j.apm.2024.04.012_bib0029) 2020; 134 Wen (10.1016/j.apm.2024.04.012_bib0001) 2023; 10 Yang (10.1016/j.apm.2024.04.012_bib0031) 2022; 24 Wu (10.1016/j.apm.2024.04.012_bib0028) 2016; 359 |
| References_xml | – volume: 61 start-page: 645 year: 2022 end-page: 652 ident: bib0023 article-title: Diffractive imaging and intermodulation based multiple image encryption publication-title: Appl. Optics – volume: 153 start-page: 59 year: 2022 end-page: 66 ident: bib0011 article-title: Image encryption based on logistic chaotic systems and deep autoencoder publication-title: Pattern Recogn. Lett. – volume: 62 start-page: 33 year: 2023 ident: bib0003 article-title: Visually meaningful quantum color image encryption scheme based on measured alternate quantum walks and quantum Logistic mixed linear-nonlinear coupled mapping lattices publication-title: Int. J. Theor. Phys. – volume: 592 start-page: 1 year: 2022 end-page: 20 ident: bib0004 article-title: An image encryption algorithm based on new generalized fusion fractal structure publication-title: Inf. Sci. – volume: 205 year: 2022 ident: bib0016 article-title: Image encryption scheme based on blind signature and an improved Lorenz system publication-title: Expert Syst. Appl. – volume: 143 year: 2021 ident: bib0030 article-title: An optical image encryption based on computational ghost imaging with sparse reconstruction publication-title: Opt. Lasers Eng. – volume: 167 year: 2023 ident: bib0006 article-title: Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR publication-title: Opt. Laser Technol. – volume: 359 start-page: 38 year: 2016 end-page: 43 ident: bib0028 article-title: Multiple-image encryption based on computational ghost imaging publication-title: Opt. Commun. – volume: 120 start-page: 153 year: 2023 end-page: 174 ident: bib0010 article-title: A novel devaney chaotic map with uniform trajectory for color image encryption publication-title: Appl. Math. Model. – volume: 103 start-page: 2867 year: 2021 end-page: 2880 ident: bib0019 article-title: Dynamical analysis of a new chaotic system: asymmetric multistability, offset boosting control and circuit realization publication-title: Nonlinear Dyn. – volume: 55 start-page: 2230 year: 2009 end-page: 2249 ident: bib0041 article-title: Subspace pursuit for compressive sensing signal reconstruction publication-title: IEEE Trans. Inf. Theory – volume: 213 year: 2023 ident: bib0007 article-title: A novel pixel-split image encryption scheme based on 2D Salomon map publication-title: Expert Syst. Appl. – volume: 149 year: 2022 ident: bib0017 article-title: Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion publication-title: Opt. Laser Technol. – volume: 81 start-page: 25497 year: 2022 end-page: 25518 ident: bib0008 article-title: Image encryption based on a combination of multiple chaotic maps publication-title: Multimed. Tools Appl. – volume: 160 year: 2023 ident: bib0014 article-title: A new one-dimensional chaotic map for image encryption scheme based on random DNA coding publication-title: Opt. Laser Technol. – volume: 537 year: 2023 ident: bib0034 article-title: Computational ghost imaging with key-patterns for image encryption publication-title: Opt. Commun. – volume: 128 year: 2020 ident: bib0036 article-title: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm publication-title: Opt. Lasers Eng. – volume: 53 start-page: 4655 year: 2007 end-page: 4666 ident: bib0042 article-title: Signal recovery from random measurements via orthogonal matching pursuit publication-title: IEEE Trans. Inf. Theory – volume: 45 start-page: 35 year: 2019 end-page: 43 ident: bib0021 article-title: Quick response code and interference-based optical asymmetric cryptosystem publication-title: J. Inf. Secur. Appl. – volume: 24 year: 2022 ident: bib0031 article-title: An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding publication-title: J. Optics-UK – volume: 67 start-page: 2077 year: 2021 end-page: 2103 ident: bib0038 article-title: A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem publication-title: Adv. Space Res. – volume: 54 start-page: 33 year: 2022 ident: bib0025 article-title: Image encryption based on computer generated hologram and Rossler chaotic system publication-title: Opt. Quant. Electron. – volume: 20 start-page: 246 year: 2021 ident: bib0015 article-title: Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map publication-title: Quantum Inf. Process. – volume: 134 year: 2020 ident: bib0029 article-title: Multiple layer encryption and steganography via multi-channel ghost imaging publication-title: Opt. Lasers Eng. – volume: 20 start-page: 767 year: 1995 end-page: 769 ident: bib0020 article-title: Optical image encryption based on input plane and Fourier plane random encoding publication-title: Opt. Lett. – volume: 142 year: 2021 ident: bib0022 article-title: Optical multiple-image authentication and encryption based on phase retrieval and interference with sparsity constraints publication-title: Opt. Laser Technol. – volume: 124 year: 2020 ident: bib0026 article-title: Optical image authentication using spatially variant polarized beam and sparse phase sampling method publication-title: Opt. Lasers Eng. – volume: 81 start-page: 20021 year: 2022 end-page: 20042 ident: bib0005 article-title: Multiple-image encryption algorithm based on chaos and gene fusion publication-title: Multimed. Tools Appl. – volume: 10 start-page: 3169 year: 2023 end-page: 3180 ident: bib0001 article-title: APCAS: autonomous privacy control and authentication sharing in social networks publication-title: IEEE Trans. Comput. Soc. Syst. – volume: 140 year: 2021 ident: bib0024 article-title: Optical color image encryption based on fingerprint key and phase-shifting digital holography publication-title: Opt. Lasers Eng. – volume: 254 year: 2022 ident: bib0027 article-title: Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in Fresnel domain publication-title: Optik (Stuttg) – volume: 26 start-page: 301 year: 2009 end-page: 321 ident: bib0040 article-title: CoSaMP: iterative signal recovery from incomplete and inaccurate samples publication-title: Appl. Comput. Harmon. A – volume: 150 year: 2022 ident: bib0037 article-title: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method publication-title: Opt. Lasers Eng. – volume: 211 year: 2023 ident: bib0009 article-title: Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation publication-title: Signal Process. – volume: 67 start-page: 394 year: 2020 end-page: 404 ident: bib0035 article-title: Plaintext-related multiple-image encryption based on computational ghost imaging publication-title: J. Mod. Optic. – volume: 171 start-page: 737 year: 1953 end-page: 738 ident: bib0039 article-title: Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid publication-title: Nature – volume: 591 year: 2022 ident: bib0018 article-title: New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG publication-title: Physica A – volume: 365 start-page: 180 year: 2016 end-page: 185 ident: bib0033 article-title: Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging publication-title: Opt. Commun. – volume: 149 year: 2022 ident: bib0002 article-title: A new combination chaotic system and its application in a new bit-level image encryption scheme publication-title: Opt. Lasers Eng. – volume: 56 start-page: 507 year: 2013 end-page: 530 ident: bib0043 article-title: An efficient augmented Lagrangian method with applications to total variation minimization publication-title: Comput. Optim. Appl. – volume: 150 year: 2021 ident: bib0013 article-title: Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map publication-title: Chaos Soliton. Fract. – volume: 45 start-page: 3917 year: 2020 end-page: 3920 ident: bib0032 article-title: Forgery attack on optical encryption based on computational ghost imaging publication-title: Opt. Lett. – volume: 238 year: 2024 ident: bib0012 article-title: Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm publication-title: Expert Syst. Appl. – volume: 140 year: 2021 ident: 10.1016/j.apm.2024.04.012_bib0024 article-title: Optical color image encryption based on fingerprint key and phase-shifting digital holography publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2021.106550 – volume: 67 start-page: 394 issue: 5 year: 2020 ident: 10.1016/j.apm.2024.04.012_bib0035 article-title: Plaintext-related multiple-image encryption based on computational ghost imaging publication-title: J. Mod. Optic. doi: 10.1080/09500340.2020.1733690 – volume: 53 start-page: 4655 issue: 12 year: 2007 ident: 10.1016/j.apm.2024.04.012_bib0042 article-title: Signal recovery from random measurements via orthogonal matching pursuit publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.2007.909108 – volume: 238 year: 2024 ident: 10.1016/j.apm.2024.04.012_bib0012 article-title: Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.122052 – volume: 67 start-page: 2077 issue: 7 year: 2021 ident: 10.1016/j.apm.2024.04.012_bib0038 article-title: A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem publication-title: Adv. Space Res. doi: 10.1016/j.asr.2021.01.018 – volume: 20 start-page: 767 issue: 7 year: 1995 ident: 10.1016/j.apm.2024.04.012_bib0020 article-title: Optical image encryption based on input plane and Fourier plane random encoding publication-title: Opt. Lett. doi: 10.1364/OL.20.000767 – volume: 26 start-page: 301 issue: 3 year: 2009 ident: 10.1016/j.apm.2024.04.012_bib0040 article-title: CoSaMP: iterative signal recovery from incomplete and inaccurate samples publication-title: Appl. Comput. Harmon. A doi: 10.1016/j.acha.2008.07.002 – volume: 143 year: 2021 ident: 10.1016/j.apm.2024.04.012_bib0030 article-title: An optical image encryption based on computational ghost imaging with sparse reconstruction publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2021.106627 – volume: 56 start-page: 507 year: 2013 ident: 10.1016/j.apm.2024.04.012_bib0043 article-title: An efficient augmented Lagrangian method with applications to total variation minimization publication-title: Comput. Optim. Appl. doi: 10.1007/s10589-013-9576-1 – volume: 45 start-page: 3917 issue: 14 year: 2020 ident: 10.1016/j.apm.2024.04.012_bib0032 article-title: Forgery attack on optical encryption based on computational ghost imaging publication-title: Opt. Lett. doi: 10.1364/OL.392424 – volume: 167 year: 2023 ident: 10.1016/j.apm.2024.04.012_bib0006 article-title: Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2023.109665 – volume: 120 start-page: 153 year: 2023 ident: 10.1016/j.apm.2024.04.012_bib0010 article-title: A novel devaney chaotic map with uniform trajectory for color image encryption publication-title: Appl. Math. Model. doi: 10.1016/j.apm.2023.03.038 – volume: 20 start-page: 246 year: 2021 ident: 10.1016/j.apm.2024.04.012_bib0015 article-title: Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map publication-title: Quantum Inf. Process. doi: 10.1007/s11128-021-03187-w – volume: 211 year: 2023 ident: 10.1016/j.apm.2024.04.012_bib0009 article-title: Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation publication-title: Signal Process. doi: 10.1016/j.sigpro.2023.109107 – volume: 45 start-page: 35 year: 2019 ident: 10.1016/j.apm.2024.04.012_bib0021 article-title: Quick response code and interference-based optical asymmetric cryptosystem publication-title: J. Inf. Secur. Appl. – volume: 124 year: 2020 ident: 10.1016/j.apm.2024.04.012_bib0026 article-title: Optical image authentication using spatially variant polarized beam and sparse phase sampling method publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.105828 – volume: 149 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0002 article-title: A new combination chaotic system and its application in a new bit-level image encryption scheme publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2021.106782 – volume: 10 start-page: 3169 issue: 6 year: 2023 ident: 10.1016/j.apm.2024.04.012_bib0001 article-title: APCAS: autonomous privacy control and authentication sharing in social networks publication-title: IEEE Trans. Comput. Soc. Syst. doi: 10.1109/TCSS.2022.3218883 – volume: 365 start-page: 180 year: 2016 ident: 10.1016/j.apm.2024.04.012_bib0033 article-title: Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging publication-title: Opt. Commun. doi: 10.1016/j.optcom.2015.12.013 – volume: 150 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0037 article-title: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2021.106881 – volume: 592 start-page: 1 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0004 article-title: An image encryption algorithm based on new generalized fusion fractal structure publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.01.042 – volume: 359 start-page: 38 year: 2016 ident: 10.1016/j.apm.2024.04.012_bib0028 article-title: Multiple-image encryption based on computational ghost imaging publication-title: Opt. Commun. doi: 10.1016/j.optcom.2015.09.039 – volume: 134 year: 2020 ident: 10.1016/j.apm.2024.04.012_bib0029 article-title: Multiple layer encryption and steganography via multi-channel ghost imaging publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2020.106227 – volume: 142 year: 2021 ident: 10.1016/j.apm.2024.04.012_bib0022 article-title: Optical multiple-image authentication and encryption based on phase retrieval and interference with sparsity constraints publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2021.107257 – volume: 62 start-page: 33 issue: 2 year: 2023 ident: 10.1016/j.apm.2024.04.012_bib0003 article-title: Visually meaningful quantum color image encryption scheme based on measured alternate quantum walks and quantum Logistic mixed linear-nonlinear coupled mapping lattices publication-title: Int. J. Theor. Phys. doi: 10.1007/s10773-022-05262-z – volume: 150 year: 2021 ident: 10.1016/j.apm.2024.04.012_bib0013 article-title: Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map publication-title: Chaos Soliton. Fract. doi: 10.1016/j.chaos.2021.111117 – volume: 153 start-page: 59 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0011 article-title: Image encryption based on logistic chaotic systems and deep autoencoder publication-title: Pattern Recogn. Lett. doi: 10.1016/j.patrec.2021.11.025 – volume: 103 start-page: 2867 year: 2021 ident: 10.1016/j.apm.2024.04.012_bib0019 article-title: Dynamical analysis of a new chaotic system: asymmetric multistability, offset boosting control and circuit realization publication-title: Nonlinear Dyn. doi: 10.1007/s11071-021-06276-8 – volume: 591 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0018 article-title: New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG publication-title: Physica A doi: 10.1016/j.physa.2021.126793 – volume: 81 start-page: 20021 issue: 14 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0005 article-title: Multiple-image encryption algorithm based on chaos and gene fusion publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-022-12554-3 – volume: 81 start-page: 25497 issue: 18 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0008 article-title: Image encryption based on a combination of multiple chaotic maps publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-022-12595-8 – volume: 213 year: 2023 ident: 10.1016/j.apm.2024.04.012_bib0007 article-title: A novel pixel-split image encryption scheme based on 2D Salomon map publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.118845 – volume: 128 year: 2020 ident: 10.1016/j.apm.2024.04.012_bib0036 article-title: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.105995 – volume: 55 start-page: 2230 issue: 5 year: 2009 ident: 10.1016/j.apm.2024.04.012_bib0041 article-title: Subspace pursuit for compressive sensing signal reconstruction publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.2009.2016006 – volume: 171 start-page: 737 issue: 4356 year: 1953 ident: 10.1016/j.apm.2024.04.012_bib0039 article-title: Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid publication-title: Nature doi: 10.1038/171737a0 – volume: 54 start-page: 33 issue: 1 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0025 article-title: Image encryption based on computer generated hologram and Rossler chaotic system publication-title: Opt. Quant. Electron. doi: 10.1007/s11082-021-03406-9 – volume: 205 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0016 article-title: Image encryption scheme based on blind signature and an improved Lorenz system publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.117709 – volume: 149 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0017 article-title: Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2022.107879 – volume: 254 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0027 article-title: Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in Fresnel domain publication-title: Optik (Stuttg) – volume: 537 year: 2023 ident: 10.1016/j.apm.2024.04.012_bib0034 article-title: Computational ghost imaging with key-patterns for image encryption publication-title: Opt. Commun. doi: 10.1016/j.optcom.2022.129190 – volume: 61 start-page: 645 issue: 2 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0023 article-title: Diffractive imaging and intermodulation based multiple image encryption publication-title: Appl. Optics doi: 10.1364/AO.446586 – volume: 160 year: 2023 ident: 10.1016/j.apm.2024.04.012_bib0014 article-title: A new one-dimensional chaotic map for image encryption scheme based on random DNA coding publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2022.109033 – volume: 24 issue: 6 year: 2022 ident: 10.1016/j.apm.2024.04.012_bib0031 article-title: An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding publication-title: J. Optics-UK |
| SSID | ssj0005904 |
| Score | 2.6349616 |
| Snippet | •A new optical image encryption and authentication scheme is proposed with the computational ghost imaging.•The problem of inherent linear defect and key... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 49 |
| SubjectTerms | Authentication Chaotic system Computational ghost imaging DNA computing Optical image encryption |
| Title | Optical image encryption and authentication scheme with computational ghost imaging |
| URI | https://dx.doi.org/10.1016/j.apm.2024.04.012 |
| Volume | 131 |
| WOSCitedRecordID | wos001237937800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 0307-904X databaseCode: AIEXJ dateStart: 20211207 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0005904 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3da9swEBdbu4ftYeyTdluHHvrU4qFY8tdjCC3d6NpBWgh9Mf6Ql5TGDUlc2v9-d9JJWdZtbINBMMFIltH9ON2df3fH2G5dxXWjehmyxEUA2k8FJRjGQSp1AwdUUejUJAofJycn6WiUfaGA_sK0E0jaNr29zWb_VdRwD4SNqbN_IW7_ULgB_0HocAWxw_WPBH86s-HpyRTpOPBm8zurFkxZViS0t0sK1O2Da6un2vHPsb-Diw1-xewP8wx3trlStWS2Tn29V8w_wX46V24k0nk6E4K9GHvcDCgNZNgFR50_Cy7G1x2FBlZziSV8PPEjKSwRKk9hpViZy5dZo3OakpSZsJxMr3_pGLAa1BYwpbPYNmS5p-VtwOHyQzHDWgKhMsVqiY29Xjx7iCvigkiVRW_sIdsMkygD_bfZ_3gw-rSiA2VCuaKZOMF9ATdcwB8W-rkN851dcvaMPSWHgvctEJ6zB7p9wZ589tJZvGRDggQ3kOArSHCABF-HBLeQ4AgJvgYJbiDBCRKv2PnhwdngKKBmGkEVZskySFNwXFUjZRwVaa8qYl0kAqxPsO8jIeCQ0wWMqMuk1LIBJ7opyyxtokSWcYVfp-VrttFet3qLcV3Hug5FXBcSnHtdlWDTYBmhUEalkqraZsJtT15RpXlseHKVO0rhZQ47muOO5gJ-vXCb7fkpM1tm5XeDldvznOxEa__lAJBfT3vzb9PesscrfL9jG8t5p3fYo-pmOVnM3xOMvgHbgI3A |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optical+image+encryption+and+authentication+scheme+with+computational+ghost+imaging&rft.jtitle=Applied+mathematical+modelling&rft.au=Guo%2C+Zhe&rft.au=Chen%2C+Su-Hua&rft.au=Zhou%2C+Ling&rft.au=Gong%2C+Li-Hua&rft.date=2024-07-01&rft.pub=Elsevier+Inc&rft.issn=0307-904X&rft.volume=131&rft.spage=49&rft.epage=66&rft_id=info:doi/10.1016%2Fj.apm.2024.04.012&rft.externalDocID=S0307904X24001550 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0307-904X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0307-904X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0307-904X&client=summon |