Optical ghost cryptography and steganography

Hong Chao Liu, Wen Chen

Research output: Journal article publicationJournal articleAcademic researchpeer-review

22 Citations (Scopus)

Abstract

As an indirect imaging technique, computational ghost imaging (GI) obtains the object information by calculating the intensity correlation between a series of computer-generated matrices and the corresponding bucket signals, which thereby offers a potential application in optical encryption. Here, we propose a new steganography scheme, called ghost steganography, based on the principle of computational GI. In our ghost steganography scheme, the bucket intensity signals of a secret image are concealed into the ones of a non-secret image by applying a non-conspicuous number integration process. To further increase the security, we introduce RSA cryptography to encode the integrated bucket signals after the steganography process. Simulation and experiment results fully demonstrate the feasibility of our optical ghost cryptography and steganography scheme. Our work paves a way to the application of GI in steganography and also enriches the knowledge of symmetric and asymmetric optical cryptography. @ Elsevier, 2020.

Original languageEnglish
Article number106094
JournalOptics and Lasers in Engineering
Volume130
DOIs
Publication statusPublished - Jul 2020

Keywords

  • Computational ghost imaging
  • Ghost cryptography
  • Ghost steganography
  • Optical data processing
  • Reconstruction techniques

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Atomic and Molecular Physics, and Optics
  • Mechanical Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Optical ghost cryptography and steganography'. Together they form a unique fingerprint.

Cite this