Highly Trustworthy In-Sensor Cryptography for Image Encryption and Authentication
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shao, Bangjie | - |
dc.contributor.author | Wan, Tianqing | - |
dc.contributor.author | Liao, Fuyou | - |
dc.contributor.author | Kim, Beom Jin | - |
dc.contributor.author | Chen, Jiewei | - |
dc.contributor.author | Guo, Jianmiao | - |
dc.contributor.author | Ma, Sijie | - |
dc.contributor.author | Ahn, Jong-Hyun | - |
dc.contributor.author | Chai, Yang | - |
dc.date.accessioned | 2023-09-17T23:40:04Z | - |
dc.date.available | 2023-09-17T23:40:04Z | - |
dc.date.issued | 2023-05 | - |
dc.identifier.issn | 1936-0851 | - |
dc.identifier.issn | 1936-086X | - |
dc.identifier.uri | https://yscholarhub.yonsei.ac.kr/handle/2021.sw.yonsei/6681 | - |
dc.description.abstract | Theprevailing transmission of image information overthe Internetof Things demands trustworthy cryptography for high security and privacy.State-of-the-art security modules are usually physically separatedfrom the sensory terminals that capture images, which unavoidablyexposes image information to various attacks during the transmissionprocess. Here we develop in-sensor cryptography that enables capturingimages and producing security keys in the same hardware devices. Thegenerated key inherently binds to the captured images, which givesrise to highly trustworthy cryptography. Using the intrinsic electronicand optoelectronic characteristics of the 256 molybdenum disulfidephototransistor array, we can harvest electronic and optoelectronicbinary keys with a physically unclonable function and further upgradethem into multiple-state ternary and double-binary keys, exhibitinghigh uniformity, uniqueness, randomness, and coding capacity. Thisin-sensor cryptography enables highly trustworthy image encryptionto avoid passive attacks and image authentication to prevent unauthorizededitions. | - |
dc.format.extent | 9 | - |
dc.publisher | AMER CHEMICAL SOC | - |
dc.title | Highly Trustworthy In-Sensor Cryptography for Image Encryption and Authentication | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1021/acsnano.3c00487 | - |
dc.identifier.wosid | 001006500000001 | - |
dc.identifier.bibliographicCitation | ACS NANO, v.17, no.11, pp 10291 - 10299 | - |
dc.citation.title | ACS NANO | - |
dc.citation.volume | 17 | - |
dc.citation.number | 11 | - |
dc.citation.startPage | 10291 | - |
dc.citation.endPage | 10299 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in Scholar Hub are protected by copyright, with all rights reserved, unless otherwise indicated.
Yonsei University 50 Yonsei-ro Seodaemun-gu, Seoul, 03722, Republic of Korea1599-1885
© 2021 YONSEI UNIV. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.