دورية أكاديمية

Compressed 3D Image Information and Communication Security

التفاصيل البيبلوغرافية
العنوان: Compressed 3D Image Information and Communication Security
المؤلفون: Yang, Chengshuai, Ding, Yuyang, Liang, Jinyang, Cao, Fengyan, Qi, Dalong, Jia, Tianqing, Sun, Zhenrong, Zhang, Shian, Chen, Wei, Yin, Zhenqiang, Wang, Shuang, Han, Zhengfu, Guo, Guangcan, Wang, Lihong V.
المصدر: Advanced Quantum Technologies, 1(2), Art. No. 1800034, (2018-10)
بيانات النشر: Wiley
سنة النشر: 2018
المجموعة: Caltech Authors (California Institute of Technology)
مصطلحات موضوعية: compressed sensing, image encryption and decryption, information and communication security, quantum key distribution
الوصف: Ensuring information and communication security in military messages, government instructions, scientific experiments, as well as in personal data processing, is critical. In this study, a new hybrid classical–quantum cryptographic scheme to protect image information and communication security is developed by combining a quantum key distribution (QKD) and compressed sensing (CS). This method employs a QKD system to generate true random codes among the remote legitimate users and utilizes these random codes to encrypt and decrypt compressed 3D image information based on the CS algorithm. Therefore, this new technique can provide computational security in the image information transmission process by the encryption and decryption of CS algorithm, and the information and communication security can be evaluated in real time by monitoring the QKD system. Furthermore, this technique can directly transmit and reconstruct the compressed 3D image information based on the modified TwIST algorithm, and thus fewer random codes are required in QKD system, which can improve the information transmission bandwidth. Consequently, this technique not only provides a new application of a QKD system but also extends the CSâ€based image reconstruction from 2D to 3D. This study may open a new opportunity in the field of information and security communication. ; © 2018 Wileyâ€VCH Verlag GmbH & Co. KGaA, Weinheim. Received: April 19, 2018; Revised: May 6, 2018; Published online: June 22, 2018. C.Y. and Y.D. contributed equally to this study. C.Y. wrote the program, performed the experiments, analyzed the data, and prepared the manuscript. Y.D. built the experimental system, analyzed the data, and prepared the manuscript. J.L. wrote a part of program. F.C. performed some of experiments. D.Q. performed some of experiments. T.J. analyzed the data. S.Z. contributed to the data analysis and manuscript revision. Z.S. contributed to the experimental design, image reconstruction, data analysis, and manuscript revision. W.C. contributed ...
نوع الوثيقة: article in journal/newspaper
اللغة: unknown
العلاقة: https://doi.org/10.1002/qute.201800034Test; oai:authors.library.caltech.edu:dab83-83f29; eprintid:93275; resolverid:CaltechAUTHORS:20190226-142528507
DOI: 10.1002/qute.201800034
الإتاحة: https://doi.org/10.1002/qute.201800034Test
حقوق: info:eu-repo/semantics/closedAccess ; Other
رقم الانضمام: edsbas.9CF15B44
قاعدة البيانات: BASE