Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Preventing forgery attacks in computational ghost imaging or disabling ghost imaging in a “spatiotemporal” scattering medium with weighted multiplicative signals

Not Accessible

Your library or personal account may give you access

Abstract

The ghost imaging (GI) approach is an intriguing and promising image acquisition technique that can transmit high-quality image information in a scattering environment. In this paper, we focus on two concerns recently emerged in the GI modality: one is the vulnerability to forgery attacks in GI-based optical encryption [Opt. Lett. 45, 3917 (2020) [CrossRef]  ], and the other is the potential threat of GI to personal privacy regarding non-invasive imaging [Opt. Express 28, 17232 (2020) [CrossRef]  ]. The core idea is to recommend introducing weighted multiplicative signals [Opt. Express 27, 36505 (2019) [CrossRef]  ] into the computational GI system, whether on the transmitting end or the receiving end. At the transmitting end, the random multiplicative signal can be used as an additional key that can reduce the possibility of forgery attacks, thereby increasing image transmission security. On the receiving end, the introduction of a random multiplicative signal to a spatial scattering medium makes it a “spatiotemporal” scattering medium, whose transmittance changes with time. Further, the spatiotemporal scattering medium can disable direct imaging and GI at the same time with low cost, thereby having great potential in privacy protection in daily lives.

© 2021 Optical Society of America

Full Article  |  PDF Article
More Like This
Generalized forgery attack to optical encryption systems

Jun Feng, Wei Huang, Shuming Jiao, and Xiaopeng Wang
Opt. Express 29(26) 43580-43597 (2021)

Forgery attack on optical encryption based on computational ghost imaging

Sheng Yuan, Lanjie Wang, Xuemei Liu, and Xin Zhou
Opt. Lett. 45(14) 3917-3920 (2020)

Computational ghost imaging with spatiotemporal encoding pseudo-random binary patterns

Zhiyuan Ye, Hong-Chao Liu, and Jun Xiong
Opt. Express 28(21) 31163-31179 (2020)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (11)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (6)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.