التفاصيل البيبلوغرافية
العنوان: |
Compressed 3D Image Information and Communication Security |
المؤلفون: |
Yang, Chengshuai, Ding, Yuyang, Liang, Jinyang, Cao, Fengyan, Qi, Dalong, Jia, Tianqing, Sun, Zhenrong, Zhang, Shian, Chen, Wei, Yin, Zhenqiang, Wang, Shuang, Han, Zhengfu, Guo, Guangcan, Wang, Lihong V. |
المصدر: |
Advanced Quantum Technologies, 1(2), Art. No. 1800034, (2018-10) |
بيانات النشر: |
Wiley |
سنة النشر: |
2018 |
المجموعة: |
Caltech Authors (California Institute of Technology) |
مصطلحات موضوعية: |
compressed sensing, image encryption and decryption, information and communication security, quantum key distribution |
الوصف: |
Ensuring information and communication security in military messages, government instructions, scientific experiments, as well as in personal data processing, is critical. In this study, a new hybrid classical–quantum cryptographic scheme to protect image information and communication security is developed by combining a quantum key distribution (QKD) and compressed sensing (CS). This method employs a QKD system to generate true random codes among the remote legitimate users and utilizes these random codes to encrypt and decrypt compressed 3D image information based on the CS algorithm. Therefore, this new technique can provide computational security in the image information transmission process by the encryption and decryption of CS algorithm, and the information and communication security can be evaluated in real time by monitoring the QKD system. Furthermore, this technique can directly transmit and reconstruct the compressed 3D image information based on the modified TwIST algorithm, and thus fewer random codes are required in QKD system, which can improve the information transmission bandwidth. Consequently, this technique not only provides a new application of a QKD system but also extends the CSâ€based image reconstruction from 2D to 3D. This study may open a new opportunity in the field of information and security communication. ; © 2018 Wileyâ€VCH Verlag GmbH & Co. KGaA, Weinheim. Received: April 19, 2018; Revised: May 6, 2018; Published online: June 22, 2018. C.Y. and Y.D. contributed equally to this study. C.Y. wrote the program, performed the experiments, analyzed the data, and prepared the manuscript. Y.D. built the experimental system, analyzed the data, and prepared the manuscript. J.L. wrote a part of program. F.C. performed some of experiments. D.Q. performed some of experiments. T.J. analyzed the data. S.Z. contributed to the data analysis and manuscript revision. Z.S. contributed to the experimental design, image reconstruction, data analysis, and manuscript revision. W.C. contributed ... |
نوع الوثيقة: |
article in journal/newspaper |
اللغة: |
unknown |
العلاقة: |
https://doi.org/10.1002/qute.201800034Test; oai:authors.library.caltech.edu:dab83-83f29; eprintid:93275; resolverid:CaltechAUTHORS:20190226-142528507 |
DOI: |
10.1002/qute.201800034 |
الإتاحة: |
https://doi.org/10.1002/qute.201800034Test |
حقوق: |
info:eu-repo/semantics/closedAccess ; Other |
رقم الانضمام: |
edsbas.9CF15B44 |
قاعدة البيانات: |
BASE |