Optical encryption and authentication scheme based on phase-shifting interferometry in a joint transform correlator

被引:9
|
作者
Xiong, Y. [1 ]
Du, J. [1 ]
Quan, C. [1 ]
机构
[1] Natl Univ Singapore, Dept Mech Engn, 9 Engn Dr 1, Singapore 117576, Singapore
来源
关键词
Optical image encryption and authentication; Photon-limited binary intensity pattern; Phase-shifting; Joint transform correlator; DOUBLE-IMAGE ENCRYPTION; CHOSEN-PLAINTEXT ATTACK; EQUAL MODULUS DECOMPOSITION; REFERENCE WAVE; INFORMATION; CRYPTANALYSIS; VULNERABILITY; PLANE; MODEL;
D O I
10.1016/j.optlastec.2020.106108
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, the effectiveness of the cryptosystem based on phase-shifting technique (PST) in a joint transform correlator (JTC) is evaluated. It is shown that the cryptosystem has some inherent drawbacks, for example, since the plaintexts are required to obtain the phase-shifting intensity patterns in the first phase extraction step, which means that the information of the plaintexts should be known by the authorized users before decryption processing. It seems impossible and paradoxical in the practical case. Moreover, the cryptosystem can only achieve binary plaintexts encryption while the inputs of this scheme cannot be the gray-scale or color images. To address these issues, we propose an encryption and authentication scheme based on PST in a JTC. By introducing a preprocessing operation including an intensity modulator based on histogram equalization and photon-counting (PC) operator, a photon-limited binary distribution of the plaintexts is obtained and used as the input of the cryptosystem. Due to this design, our proposed scheme can achieve encryption for different kinds of images such as binary, gray-scale and color images using same optical setup without any changes, which can simplify the optical implementation. Furthermore, a post-processing operator to extract phase information of encoded images and authenticate the decoded images is introduced. Since no useful information will be released from the photon-limited binary decoded images obtained using correct decryption keys and the interface of the database storing the plaintexts is only given to the authorized users, an additional security layer is established. This is the first time to report the use of binary intensity pattern in a scheme based on PSI in a JTC for secured verification of different images.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Optical encryption using phase-shifting interferometry in a joint transform correlator
    La Mela, Cecilia
    Iemmi, Claudio
    [J]. OPTICS LETTERS, 2006, 31 (17) : 2562 - 2564
  • [2] Compressive optical image encryption using phase-shifting interferometry on a joint transform correlator
    Li, Jun
    Jia, Bangwen
    Dai, Xiaofang
    Lei, Miao
    Yang, Chanxia
    Li, Jiaosheng
    Li, Hongbing
    Li, Rong
    [J]. OPTICA APPLICATA, 2017, 47 (02) : 245 - 256
  • [3] Double-image encryption based on joint transform correlation and phase-shifting interferometry
    沈丽娜
    李军
    常鸿森
    [J]. Chinese Optics Letters, 2007, (12) : 687 - 689
  • [4] Double-image encryption based on joint transform correlation and phase-shifting interferometry
    Shen, Lina
    Li, Jun
    Chang, Hongsen
    [J]. CHINESE OPTICS LETTERS, 2007, 5 (12) : 687 - 689
  • [5] Evaluation and correction of aberrations in an optical correlator by phase-shifting interferometry
    Iemmi, C
    Moreno, A
    Nicolás, J
    Campos, J
    [J]. OPTICS LETTERS, 2003, 28 (13) : 1117 - 1119
  • [6] Image encryption based on gyrator transform and two-step phase-shifting interferometry
    Li, Huijuan
    [J]. OPTICS AND LASERS IN ENGINEERING, 2009, 47 (01) : 45 - 50
  • [7] Phase-shifting technique applied to circular harmonic-based joint transform correlator
    GUAM Jiuhong
    [J]. Science Bulletin, 2000, (20) : 1908 - 1912
  • [8] Phase-shifting technique applied to circular harmonic-based joint transform correlator
    Guan, JH
    Wang, ZQ
    Liu, HL
    Liang, BL
    Mu, GG
    [J]. CHINESE SCIENCE BULLETIN, 2000, 45 (20): : 1908 - 1912
  • [9] Phase-only encryption and watermarking based on phase-shifting interferometry
    He, MZ
    Cai, LZ
    Liu, Q
    Yang, XL
    [J]. APPLIED OPTICS, 2005, 44 (13) : 2600 - 2606
  • [10] Optoelectronic information encryption with phase-shifting interferometry
    Tajahuerce, E
    Matoba, O
    Verrall, SC
    Javidi, B
    [J]. APPLIED OPTICS, 2000, 39 (14) : 2313 - 2320