Association Mission
The mission of the association is to advance the creation, communication and application of knowledge to benefit society and improve people's lives.
Membership
Contact Us
Volume 26 - ICOP & ICPET 2020
ICOP & ICPET _ INPC _ ICOFS 2020, 26 - ICOP & ICPET 2020: 93-96 |
Back to browse issues page
Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:
Rajabi Ghaleh S, Ahmadi Kandjani S, Kheradmand R. Encryption based on sweeping computational ghost imaging. ICOP & ICPET _ INPC _ ICOFS 2020; 26 :93-96
URL: http://opsi.ir/article-1-1986-en.html
URL: http://opsi.ir/article-1-1986-en.html
1- university of Tabriz.
Abstract: (1631 Views)
In this paper we introduce new method for computational ghost imaging (CGI). This method call sweeping computational ghost imaging (SCGI). By introducing row and column sweep speckle patterns that was illuminated on the object, final image are retrieved via cross product of row and column matrices from images that are reconstructed with row and column sweep speckle patterns. Results of this method was performed both theoretical and experimental. This method was used for data encrypt by symmetric and asymmetric systems. In the symmetric, four main actions and select row and column of images are as private key. In the asymmetric, reconstructed images of row and column sweep speckle patterns and four main actions are as public and private keys, respectively. Because of final image reconstructed by cross product operator, therefore was used four main actions for decrypt of information. Experimental and simulation results show that eavesdrop 100 percentage of data transfer, users couldn’t achieved basic information. In result, this method provide full security for data transfer between two users.
Rights and permissions | |
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. |