New, enhanced security of data storage and transmission via optical 'marked ghost imaging' technology

Jun 24, 2014
Ghost writing the whip
A schematic illustration of marked ghost imaging. Credit: W. Chen and X. Chen/NUS

"Ghost imaging" sounds like the spooky stuff of frivolous fiction, but it's an established technique for reconstructing hi-res images of objects partly obscured by clouds or smoke. Now a group of researchers at the National University of Singapore (NUS) is applying the same idea in reverse to securing stored or shared electronic data.

Described in the journal Applied Physics Letters, from AIP Publishing, the work establishes "marked ghost imaging" technology as a new type of multi-layer verification protocol for or transmission.

By "ghosting up" data, the scientists can hide the contents of electronic communications from hackers, deconstructing it into multiple foggy files that make no sense on their own and can only be reconstructed by someone who has the right decoder key (technically called a "reference intensity sequence").

"The sender can send out a huge number of different reference intensity sequences—only one is authentic, and others are counterfeit—for confusing the attackers," said Wen Chen, an NUS professor who led the work with co-author Xudong Chen.

"This novel method based on ghost imaging can dramatically enhance system security, and it may be straightforward to apply it to other optical security systems," Chen added.

How the Technology Works

Information security has become one of the most important social and academic topics in recent years as massive increases in data storage have coincided with rapidly developing modern technologies for accessing that data virtually anywhere. Imaging technology has attracted more and more attention in computer security circles because of its promise to enhance the security of data storage or transmission, which is what led Chen and colleagues to develop their marked ghost based on traditional optical ghost imaging.

Traditional ghost imaging uses digital cameras to detect light bouncing directly off of an object as well as light that does not directly bounce from the object to the detector. It allows solid images of objects to be reconstructed by shining light into a beamsplitter and separating it into two correlated beams—one directed at the object and the other, reference arm directed at the camera lens. When these two beams are correlated, they create a silhouette image of the object.

Chen and colleagues report that they can do the same thing either virtually, using software, or physically, by altering the optics of the data transmission. Their technology allows them to create highly-sparse reference intensity patterns that act as security keys and lowly-sparse intensity patterns of the object as ciphertexts, the information being decoded. To decode object data, the reference-arm patterns are then processed to 'rebuild' one new reference intensity sequence. This is crucial because requiring only one rebuilt intensity sequence doesn't increase the system's complexity, while allowing multiple marks (the keys) to be hidden.

Future research includes analysis of the upper limit of keys that can be embedded without increasing the system's complexity and developing greater robustness of the system against attacks.

Explore further: Imaging surfaces with a resolution below 100 nanometers using microspheres

More information: "Marked ghost imaging" Wen Chen and Xudong Chen. Applied Physics Letters, June 24, 2014. scitation.aip.org/content/aip/… 25/10.1063/1.4879843

add to favorites email to friend print save as pdf

Related Stories

Recommended for you

New approach to form non-equilibrium structures

11 hours ago

Although most natural and synthetic processes prefer to settle into equilibrium—a state of unchanging balance without potential or energy—it is within the realm of non-equilibrium conditions where new possibilities lie. ...

Nike krypton laser achieves spot in Guinness World Records

13 hours ago

A set of experiments conducted on the Nike krypton fluoride (KrF) laser at the U.S. Naval Research Laboratory (NRL) nearly five years ago has, at long last, earned the coveted Guinness World Records title for achieving "Highest ...

Chemist develops X-ray vision for quality assurance

17 hours ago

It is seldom sufficient to read the declaration of contents if you need to know precisely what substances a product contains. In fact, to do this you need to be a highly skilled chemist or to have genuine ...

The future of ultrashort laser pulses

17 hours ago

Rapid advances in techniques for the creation of ultra-short laser pulses promise to boost our knowledge of electron motions to an unprecedented level.

IHEP in China has ambitions for Higgs factory

Jul 23, 2014

Who will lay claim to having the world's largest particle smasher?. Could China become the collider capital of the world? Questions tease answers, following a news story in Nature on Tuesday. Proposals for ...

User comments : 0