مشخصات مقاله | |
ترجمه عنوان مقاله | رمزنگاری و استگانوگرافی شبح نوری |
عنوان انگلیسی مقاله | Optical ghost cryptography and steganography |
انتشار | مقاله سال 2020 |
تعداد صفحات مقاله انگلیسی | 5 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | Scopus – Master Journals List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
4.685 در سال 2019 |
شاخص H_index | 77 در سال 2020 |
شاخص SJR | 0.989 در سال 2019 |
شناسه ISSN | 0143-8166 |
شاخص Quartile (چارک) | Q1 در سال 2019 |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | فیزیک، کامپیوتر |
گرایش های مرتبط | اپتیک و لیزر، برنامه نویسی کامپیوتر، مهندسی الگوریتم ها و محاسبات، مهندسی نرم افزار |
نوع ارائه مقاله |
ژورنال |
مجله | اپتیک و لیزر در مهندسی – Optics And Lasers In Engineering |
دانشگاه | Joint Key Laboratory of the Ministry of Education, Institute of Applied Physics and Materials Engineering, University of Macau, Avenida da Universidade, Taipa, Macao SAR, China |
کلمات کلیدی | شبح نگاری محاسباتی، پردازش داده های نوری، تکنیک های بازسازی، رمزنگاری ارواح، استگانوگرافی ارواح |
کلمات کلیدی انگلیسی | Computational ghost imaging، Optical data processing، Reconstruction techniques، Ghost cryptography، Ghost steganography |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.optlaseng.2020.106094 |
کد محصول | E14908 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
1- Introduction 2- Model and principle 3- Results and discussion 4- Conclusions References |
بخشی از متن مقاله: |
Abstract As an indirect imaging technique, computational ghost imaging (GI) obtains the object information by calculating the intensity correlation between a series of computer-generated matrices and the corresponding bucket signals, which thereby offers a potential application in optical encryption. Here, we propose a new steganography scheme, called ghost steganography, based on the principle of computational GI. In our ghost steganography scheme, the bucket intensity signals of a secret image are concealed into the ones of a non-secret image by applying a non-conspicuous number integration process. To further increase the security, we introduce RSA cryptography to encode the integrated bucket signals after the steganography process. Simulation and experiment results fully demonstrate the feasibility of our optical ghost cryptography and steganography scheme. Our work paves a way to the application of GI in steganography and also enriches the knowledge of symmetric and asymmetric optical cryptography. Introduction Ghost imaging (GI), also known as correlated imaging, is an indirect imaging modality which obtains the object information from the intensity fluctuation correlation of two beams. One beam, called object beam, going through the object, is measured by a bucket detector. The other beam, called reference beam, interacting without the object, is detected by a spatially resolved camera. GI was firstly achieved with entangled photon pairs experimentally in 1995 [1], and later extended into the classical region with various thermal light sources [2–11]. Different from the two-detector GI, Shapiro proposed the computational GI in 2008 [12], which generated the active illumination patterns by using the spatial light modulator instead of passive measurements of reference beam. Similar to the single-pixel camera technique [13], computational GI can recover the object image with only a single-pixel detector [14,15], which largely simplifies the experimental setup. Meanwhile, the correlation between the computer-generated random matrix and the object beam intensity of computational GI offered a potential application in optical encryption [16-30]. To increase the efficiency and security of optical encryption based on GI [16], different methods are proposed and developed, including gray-scale and color encryption [17], multiple-image encryptions [18,26,29], specific phase masks schemes [22,25,27,30], XOR operation scheme [24]. |