Featured Research

from universities, journals, and other organizations

Verification protocol for data storage or transmission: Ghost writing the whip

Date:
June 24, 2014
Source:
American Institute of Physics (AIP)
Summary:
"Ghost imaging" sounds like the spooky stuff of frivolous fiction, but it's an established technique for reconstructing hi-res images of objects partly obscured by clouds or smoke. Now a group of researchers is applying the same idea in reverse to securing stored or shared electronic data. Their work establishes "marked ghost imaging" technology as a new type of multi-layer verification protocol for data storage or transmission.

"Ghost imaging" sounds like the spooky stuff of frivolous fiction, but it's an established technique for reconstructing hi-res images of objects partly obscured by clouds or smoke. Now a group of researchers at the National University of Singapore (NUS) is applying the same idea in reverse to securing stored or shared electronic data.

Related Articles


Described in the journal Applied Physics Letters, from AIP Publishing, the work establishes "marked ghost imaging" technology as a new type of multi-layer verification protocol for data storage or transmission.

By "ghosting up" data, the scientists can hide the contents of electronic communications from hackers, deconstructing it into multiple foggy files that make no sense on their own and can only be reconstructed by someone who has the right decoder key (technically called a "reference intensity sequence").

"The sender can send out a huge number of different reference intensity sequences -- only one is authentic, and others are counterfeit -- for confusing the attackers," said Wen Chen, an NUS professor who led the work with co-author Xudong Chen.

"This novel method based on ghost imaging can dramatically enhance system security, and it may be straightforward to apply it to other optical security systems," Chen added.

How the Technology Works

Information security has become one of the most important social and academic topics in recent years as massive increases in data storage have coincided with rapidly developing modern technologies for accessing that data virtually anywhere. Imaging technology has attracted more and more attention in computer security circles because of its promise to enhance the security of data storage or transmission, which is what led Chen and colleagues to develop their marked ghost imaging technology based on traditional optical ghost imaging.

Traditional ghost imaging uses digital cameras to detect light bouncing directly off of an object as well as light that does not directly bounce from the object to the detector. It allows solid images of objects to be reconstructed by shining light into a beamsplitter and separating it into two correlated beams -- one directed at the object and the other, reference arm directed at the camera lens. When these two beams are correlated, they create a silhouette image of the object.

Chen and colleagues report that they can do the same thing either virtually, using software, or physically, by altering the optics of the data transmission. Their technology allows them to create highly-sparse reference intensity patterns that act as security keys and lowly-sparse intensity patterns of the object as ciphertexts, the information being decoded. To decode object data, the reference-arm patterns are then processed to 'rebuild' one new reference intensity sequence. This is crucial because requiring only one rebuilt intensity sequence doesn't increase the system's complexity, while allowing multiple marks (the keys) to be hidden.

Future research includes analysis of the upper limit of keys that can be embedded without increasing the system's complexity and developing greater robustness of the system against attacks.


Story Source:

The above story is based on materials provided by American Institute of Physics (AIP). Note: Materials may be edited for content and length.


Journal Reference:

  1. Wen Chen and Xudong Chen. Marked ghost imaging. Appl. Phys. Lett., 2014 DOI: 10.1063/1.4879843

Cite This Page:

American Institute of Physics (AIP). "Verification protocol for data storage or transmission: Ghost writing the whip." ScienceDaily. ScienceDaily, 24 June 2014. <www.sciencedaily.com/releases/2014/06/140624135639.htm>.
American Institute of Physics (AIP). (2014, June 24). Verification protocol for data storage or transmission: Ghost writing the whip. ScienceDaily. Retrieved January 28, 2015 from www.sciencedaily.com/releases/2014/06/140624135639.htm
American Institute of Physics (AIP). "Verification protocol for data storage or transmission: Ghost writing the whip." ScienceDaily. www.sciencedaily.com/releases/2014/06/140624135639.htm (accessed January 28, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Wednesday, January 28, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

PlayStation Now Smart TV App

PlayStation Now Smart TV App

Rumble (Jan. 27, 2015) PlayStation Now Smart TV app is coming soon and will be available on both Sony and Samsung HDTV, allowing you to play games without even a counsel! Check out the video for more info. Credit to &apos;booredatwork&apos;. Video provided by Rumble
Powered by NewsLook.com
WikiLeaks Accuses Google of Handing Over Emails to US

WikiLeaks Accuses Google of Handing Over Emails to US

AFP (Jan. 27, 2015) Whistleblowing site WikiLeaks accused Google of handing over the emails and electronic data of its senior staff to the US authorities without providing notification until almost three years later. Duration: 01:09 Video provided by AFP
Powered by NewsLook.com
Shark Bite Victim Making Amazing Recovery

Shark Bite Victim Making Amazing Recovery

AP (Jan. 27, 2015) A Texas woman who lost more than five pounds of flesh to a shark in the Bahamas earlier this month could be released from a Florida hospital soon. Experts believe she was bitten by a bull shark while snorkeling. (Jan. 27) Video provided by AP
Powered by NewsLook.com
Cablevision Enters Wi-Fi Phone Fray

Cablevision Enters Wi-Fi Phone Fray

Reuters - Business Video Online (Jan. 26, 2015) The entry by Cablevision and Google could intensify the already heated price wars for mobile phone service. Fred Katayama reports. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins