Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published October 2018 | public
Journal Article

Compressed 3D Image Information and Communication Security

Abstract

Ensuring information and communication security in military messages, government instructions, scientific experiments, as well as in personal data processing, is critical. In this study, a new hybrid classical–quantum cryptographic scheme to protect image information and communication security is developed by combining a quantum key distribution (QKD) and compressed sensing (CS). This method employs a QKD system to generate true random codes among the remote legitimate users and utilizes these random codes to encrypt and decrypt compressed 3D image information based on the CS algorithm. Therefore, this new technique can provide computational security in the image information transmission process by the encryption and decryption of CS algorithm, and the information and communication security can be evaluated in real time by monitoring the QKD system. Furthermore, this technique can directly transmit and reconstruct the compressed 3D image information based on the modified TwIST algorithm, and thus fewer random codes are required in QKD system, which can improve the information transmission bandwidth. Consequently, this technique not only provides a new application of a QKD system but also extends the CS‐based image reconstruction from 2D to 3D. This study may open a new opportunity in the field of information and security communication.

Additional Information

© 2018 Wiley‐VCH Verlag GmbH & Co. KGaA, Weinheim. Received: April 19, 2018; Revised: May 6, 2018; Published online: June 22, 2018. C.Y. and Y.D. contributed equally to this study. C.Y. wrote the program, performed the experiments, analyzed the data, and prepared the manuscript. Y.D. built the experimental system, analyzed the data, and prepared the manuscript. J.L. wrote a part of program. F.C. performed some of experiments. D.Q. performed some of experiments. T.J. analyzed the data. S.Z. contributed to the data analysis and manuscript revision. Z.S. contributed to the experimental design, image reconstruction, data analysis, and manuscript revision. W.C. contributed to the experimental design, data analysis, and manuscript revision. Z.Y. performed some of theoretical calculations. S.W. performed some of experiments. Z.H. contributed to the experimental design. G.G. contributed to the experimental design. L.V.W. contributed to the conceptual system and manuscript revision. This work was supported partly by National Natural Science Foundation of China (Nos. 11474096, 11774094, 61627820, 61675189, 61622506, 61475148, 61575183), Science and Technology Commission of Shanghai Municipality (Nos. 16520721200, 17ZR1446900), National Key Research and Development Program of China (Nos. 2016YFA0302600, 2016YFA0301702), and "Strategic Priority Research Program (B)" of the Chinese Academy of Sciences (No. XDB01030100). All the research participants confirm that they are aware and agree that their images in Figures 2-4 are used for the research description and that their pictures are shown in this article. The authors declare no conflict of interest.

Additional details

Created:
August 22, 2023
Modified:
October 20, 2023