{"id":"https://openalex.org/W7125615326","doi":"https://doi.org/10.1007/s44443-026-00483-2","title":"A computational ghost imaging multi-party collaborative decryption method for low-resolution images","display_name":"A computational ghost imaging multi-party collaborative decryption method for low-resolution images","publication_year":2026,"publication_date":"2026-01-24","ids":{"openalex":"https://openalex.org/W7125615326","doi":"https://doi.org/10.1007/s44443-026-00483-2"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-026-00483-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00483-2","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44443-026-00483-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074483963","display_name":"Jianan Wu","orcid":"https://orcid.org/0000-0003-3207-965X"},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianan Wu","raw_affiliation_strings":["College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I106645853"]},{"raw_affiliation_string":"Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123727438","display_name":"Xiaoyang Zeng","orcid":null},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyang Zeng","raw_affiliation_strings":["College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I106645853"]},{"raw_affiliation_string":"Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100423058","display_name":"Zilong Zhao","orcid":"https://orcid.org/0000-0003-4788-3106"},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zilong Zhao","raw_affiliation_strings":["College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I106645853"]},{"raw_affiliation_string":"Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101503963","display_name":"Yu Xia","orcid":"https://orcid.org/0000-0002-0305-355X"},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Xia","raw_affiliation_strings":["College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I106645853"]},{"raw_affiliation_string":"Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036130375","display_name":"Dexin Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I106645853","display_name":"Changchun University of Science and Technology","ror":"https://ror.org/007mntk44","country_code":"CN","type":"education","lineage":["https://openalex.org/I106645853"]},{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dexin Zhu","raw_affiliation_strings":["College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I106645853"]},{"raw_affiliation_string":"Quantum Cryptography and Digital Intelligence Cyber Security Laboratory, Changchun University, Changchun, 130022, Jilin, China","institution_ids":["https://openalex.org/I194450716"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036130375"],"corresponding_institution_ids":["https://openalex.org/I106645853","https://openalex.org/I194450716"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27209302,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11996","display_name":"Random lasers and scattering media","score":0.6621999740600586,"subfield":{"id":"https://openalex.org/subfields/3102","display_name":"Acoustics and Ultrasonics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11996","display_name":"Random lasers and scattering media","score":0.6621999740600586,"subfield":{"id":"https://openalex.org/subfields/3102","display_name":"Acoustics and Ultrasonics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.17919999361038208,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.03790000081062317,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ghost-imaging","display_name":"Ghost imaging","score":0.7572000026702881},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6678000092506409},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6541000008583069},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.636900007724762},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6215000152587891},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5795999765396118},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4560000002384186},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.44029998779296875}],"concepts":[{"id":"https://openalex.org/C2776646148","wikidata":"https://www.wikidata.org/wiki/Q12367738","display_name":"Ghost imaging","level":2,"score":0.7572000026702881},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6841999888420105},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6678000092506409},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6541000008583069},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.636900007724762},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6215000152587891},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5795999765396118},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4936999976634979},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4560000002384186},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.44029998779296875},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43880000710487366},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.41510000824928284},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.391400009393692},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3772999942302704},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3767000138759613},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.37229999899864197},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.36079999804496765},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.31949999928474426},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.28189998865127563},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.27390000224113464},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.2630999982357025},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.2587999999523163},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.25600001215934753},{"id":"https://openalex.org/C141379421","wikidata":"https://www.wikidata.org/wiki/Q6094427","display_name":"Iterative reconstruction","level":2,"score":0.25360000133514404},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.2533999979496002},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-026-00483-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00483-2","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:842d63e133f44f31ba68a034c79f01a8","is_oa":true,"landing_page_url":"https://doaj.org/article/842d63e133f44f31ba68a034c79f01a8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 38, Iss 3 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-026-00483-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00483-2","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1836445800","display_name":null,"funder_award_id":"20220101132JC","funder_id":"https://openalex.org/F4320310121","funder_display_name":"Natural Science Foundation of Jilin Province"}],"funders":[{"id":"https://openalex.org/F4320310121","display_name":"Natural Science Foundation of Jilin Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1970010076","https://openalex.org/W1971500547","https://openalex.org/W1980155115","https://openalex.org/W2053111047","https://openalex.org/W2064076387","https://openalex.org/W2069089470","https://openalex.org/W2102892532","https://openalex.org/W2107420448","https://openalex.org/W2116467012","https://openalex.org/W2146360671","https://openalex.org/W2159390040","https://openalex.org/W2168970529","https://openalex.org/W2744769070","https://openalex.org/W2800389985","https://openalex.org/W2898851659","https://openalex.org/W2910671288","https://openalex.org/W2947977220","https://openalex.org/W2962817839","https://openalex.org/W2970398940","https://openalex.org/W2988708782","https://openalex.org/W3035777017","https://openalex.org/W3083080107","https://openalex.org/W3149894201","https://openalex.org/W3188771615","https://openalex.org/W4223411839","https://openalex.org/W4323257183","https://openalex.org/W4390116357","https://openalex.org/W4390978869","https://openalex.org/W4402094067"],"related_works":[],"abstract_inverted_index":{"Computational":[0],"ghost":[1],"imaging":[2,6],"(CGI)":[3],"is":[4,136,154,176],"an":[5,37,60],"technique":[7],"that":[8],"uses":[9,18,101],"the":[10,24,27,40,44,50,90,93,112,121,126,140,166,179,187,193,196],"second-order":[11],"correlation":[12],"properties":[13],"of":[14,39,92,128,161,186,195],"optical":[15],"fields.":[16],"It":[17],"random":[19],"illumination":[20,45],"patterns":[21,46],"to":[22,76,105,138,150,164,202,209],"illuminate":[23],"object,":[25],"collects":[26],"signal":[28],"via":[29,96],"a":[30,66,102,107,158,182,206],"single-pixel":[31],"bucket":[32,51],"detector,":[33],"and":[34,49,88,110,199],"later":[35],"reconstructs":[36],"image":[38],"object.":[41],"By":[42],"treating":[43],"as":[47,53,59,181],"keys":[48],"measurements":[52],"ciphertexts,":[54],"CGI":[55],"can":[56,119],"be":[57],"regarded":[58],"encryption":[61],"process.":[62],"This":[63,99],"paper":[64],"proposes":[65],"multi-party":[67],"collaborative":[68],"decryption":[69,84],"scheme":[70,198],"based":[71],"on":[72],"CGI,":[73],"which":[74,146],"aims":[75],"reduce":[77],"key":[78,129],"transmission":[79],"data":[80],"whilst":[81],"enabling":[82,184],"cooperative":[83],"among":[85],"multiple":[86,144],"users":[87],"verifying":[89],"legitimacy":[91],"ciphertext":[94,180],"source":[95],"digital":[97],"watermarking.":[98],"method":[100],"chaotic":[103,113,141,167],"system":[104],"generate":[106],"measurement":[108,122],"matrix,":[109,123],"only":[111,155],"parameter":[114,142],"needs":[115],"transmission.":[116,130],"The":[117],"receiver":[118],"reconstruct":[120,165],"thereby":[124],"reducing":[125],"amount":[127],"Further,":[131],"verifiable":[132],"secret":[133],"sharing":[134],"(VSS)":[135],"employed":[137],"divide":[139],"into":[143,178],"shares,":[145],"are":[147],"then":[148],"distributed":[149],"different":[151],"recipients.":[152],"Decryption":[153],"feasible":[156],"when":[157],"threshold":[159],"number":[160],"recipients":[162],"collaborate":[163],"parameter.":[168],"To":[169],"further":[170],"improve":[171],"security,":[172],"hashed":[173],"identity":[174],"information":[175],"embedded":[177],"watermark,":[183],"confirmation":[185],"ciphertext\u2019s":[188],"origin.":[189],"Experimental":[190],"results":[191],"show":[192],"feasibility":[194],"proposed":[197],"its":[200],"ability":[201],"resist":[203],"tampering,":[204],"offering":[205],"new":[207],"approach":[208],"secure":[210],"multi-user":[211],"communication.":[212]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-25T00:00:00"}
