DOI QR코드

DOI QR Code

Optical Encryption and Information Authentication of 3D Objects Considering Wireless Channel Characteristics

  • Lee, In-Ho (Department of Electrical, Electronic, and Control Engineering, Hankyong National University) ;
  • Cho, Myungjin (Department of Electrical, Electronic, and Control Engineering, Hankyong National University)
  • Received : 2013.10.07
  • Accepted : 2013.10.16
  • Published : 2013.12.25

Abstract

In this paper, we present an optical encryption and information authentication of 3D objects considering wireless channel characteristics. Using the optical encryption such as double random phase encryption (DRPE) and 3D integral imaging, a 3D scene with encryption can be transmitted. However, the wireless channel causes the noise and fading effects of the 3D transmitted encryption data. When the 3D encrypted data is transmitted via wireless channel, the information may be lost or distorted because there are a lot of factors such as channel noise, propagation fading, and so on. Thus, using digital modulation and maximum likelihood (ML) detection, the noise and fading effects are mitigated, and the encrypted data is estimated well at the receiver. In addition, using computational volumetric reconstruction of integral imaging and advanced correlation filters, the noise effects may be remedied and 3D information may be authenticated. To prove our method, we carry out an optical experiment for sensing 3D information and simulation for optical encryption with DRPE and authentication with a nonlinear correlation filter. To the best of our knowledge, this is the first report on optical encryption and information authentication of 3D objects considering the wireless channel characteristics.

Keywords

References

  1. A. Menezes, T. Okamoto, and S. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Tran. on Info. Th. 39, 1639-1646 (1993). https://doi.org/10.1109/18.259647
  2. C. Rackoff and D. Simon, "Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack," Proc. Crypto' 91, 433-444 (1991).
  3. S. Tsuji and T. Itoh, "An ID-based cryptosystem based on the discrete logarithm problem," IEEE Journal on Selected Areas in Communication 7, 467-473 (1989). https://doi.org/10.1109/49.17709
  4. H. Tanaka, "A realization scheme for the identity-based cryptosystem," in Proc. Crypto' 87 (Santa Barbara, USA, 1987), pp. 341-349.
  5. P. Refregier and B. Javidi, "Optical-image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  6. O. Matoba and B. Javidi, "Encrypted optical storage with angular multiplexing," Appl. Opt. 38, 7288-7293 (1999). https://doi.org/10.1364/AO.38.007288
  7. T. Nomura and B. Javidi, "Optical encryption system with a binary key code," Appl. Opt. 39, 4783-4787 (2000). https://doi.org/10.1364/AO.39.004783
  8. M. Singh, A. Kumar, and K. Singh, "Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption," Opt. Laser Technol. 40, 619-624 (2008). https://doi.org/10.1016/j.optlastec.2007.09.007
  9. Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, "Image encryption based on the random rotation operation in the fractional Fourier transform domains," Opt. Lasers Eng. 50, 1352-1358 (2012). https://doi.org/10.1016/j.optlaseng.2012.05.021
  10. M. Joshi, C. Shakher, and K. Singh, "Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys," Opt. Commun. 283, 2496-2505 (2010). https://doi.org/10.1016/j.optcom.2010.02.024
  11. Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, "Image encryption scheme by using iterative random phase encoding in gyrator transform domains," Opt. Lasers Eng. 49, 542-546 (2011). https://doi.org/10.1016/j.optlaseng.2010.12.005
  12. D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, "Key-space analysis of double random phase encryption technique," Appl. Opt. 46, 6641-6647 (2007). https://doi.org/10.1364/AO.46.006641
  13. E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett. 36, 22-24 (2011). https://doi.org/10.1364/OL.36.000022
  14. T. Sarkadi and P. Koppa, "Quantitative security evaluation of optical encryption using hybrid phase- and amplitude-modulated keys," Appl. Opt. 51, 745-750 (2012). https://doi.org/10.1364/AO.51.000745
  15. T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, "A secure data storage system based on phase-encoded thin polarization holograms," J. Opt. Pure Appl. Opt. 6, 401-411 (2004). https://doi.org/10.1088/1464-4258/6/4/017
  16. P. Koppa, "Phase-to-amplitude data page conversion for holographic storage and optical encryption," Appl. Opt. 46, 3561-3571 (2007). https://doi.org/10.1364/AO.46.003561
  17. Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, "Image encryption algorithm based on the random local phase encoding in gyrator transform domains," Opt. Commun. 285, 3921-3925 (2012). https://doi.org/10.1016/j.optcom.2012.05.061
  18. J. W. Goodman, Statistical Optics (Wiley & Sons, Inc., New York, USA, 1985).
  19. G. M. Morris, "Scene matching using photon-limited images," J. Opt. Soc. Am. A 1, 482-488 (1984). https://doi.org/10.1364/JOSAA.1.000482
  20. E. A. Watson and G. M. Morris, "Imaging thermal objects with photon-counting detector," Appl. Opt. 31, 4751-4757 (1990).
  21. F. Xiong, Digital Modulation Technique (Artech House, Norwood, USA, 2000).
  22. M. Patzold, Mobile Fading Channels (John Wiley & Sons, New York, USA, 2002).
  23. J. G. Proakis and M. Salehi, Digital Communications (McGraw-Hill, New York, USA, 2008).
  24. B. Javidi, "Nonlinear matched filter based optical correlation," Appl. Opt. 28, 4518-4520 (1989). https://doi.org/10.1364/AO.28.004518
  25. S.-H. Hong, J.-S. Jang, and B. Javidi, "Three-dimensional volumetric object reconstruction using computational integral imaging," Opt. Express 12, 483-491 (2004). https://doi.org/10.1364/OPEX.12.000483
  26. M. Cho and B. Javidi, "Three-dimensional photon counting double-random-phase encryption," Opt. Lett. 38, 3198-3201 (2013). https://doi.org/10.1364/OL.38.003198
  27. S. Yeom, Y.-H. Woo, and W.-W. Baek, "Distance extraction by means of photon-counting passive sensing," J. Opt. Soc. Korea 15, 357-361 (2011). https://doi.org/10.3807/JOSK.2011.15.4.357
  28. J. Kim, J.-H. Jung, J. Hong, J. Yeom, and B. Lee, "Elemental image generation method with the correction of mismatch error by sub-pixel," J. Opt. Soc. Korea 16, 29-35 (2012). https://doi.org/10.3807/JOSK.2012.16.1.029

Cited by

  1. Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging vol.53, pp.27, 2014, https://doi.org/10.1364/AO.53.000G25
  2. A multi-secret sharing scheme for 3D solid objects vol.42, pp.4, 2015, https://doi.org/10.1016/j.eswa.2014.10.035
  3. Image Authentication Using Only Partial Phase Information from a Double-Random-Phase-Encrypted Image in the Fresnel Domain vol.19, pp.3, 2015, https://doi.org/10.3807/JOSK.2015.19.3.241
  4. Statistics-based reconstruction method with high random-error tolerance for integral imaging vol.54, pp.28, 2015, https://doi.org/10.1364/AO.54.00E176
  5. Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging vol.56, pp.15, 2017, https://doi.org/10.1364/AO.56.004381
  6. Multiple-3D-object decryption based on one interference using two phase-only functions vol.56, pp.22, 2017, https://doi.org/10.1364/AO.56.006214
  7. Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform vol.23, pp.12, 2015, https://doi.org/10.1364/OE.23.015907
  8. Multiple-3D-object secure information system based on phase shifting method and single interference vol.55, pp.15, 2016, https://doi.org/10.1364/AO.55.004052
  9. 3D medical data security protection vol.54, 2016, https://doi.org/10.1016/j.eswa.2016.02.001
  10. Information Authentication of Three-Dimensional Photon Counting Double Random Phase Encryption Using Nonlinear Maximum Average Correlation Height Filter vol.20, pp.2, 2016, https://doi.org/10.3807/JOSK.2016.20.2.228
  11. Double random phase encoding with a Poisson-multinomial distribution for efficient colorful image authentication pp.1573-7721, 2018, https://doi.org/10.1007/s11042-018-6844-1