Browse > Article
http://dx.doi.org/10.3807/COPP.2021.5.2.155

Optical Encryption Scheme for Cipher Feedback Block Mode Using Two-step Phase-shifting Interferometry  

Jeon, Seok Hee (Department of Electronic Engineering, Incheon National University)
Gil, Sang Keun (Department of Electronic Engineering, The University of Suwon)
Publication Information
Current Optics and Photonics / v.5, no.2, 2021 , pp. 155-163 More about this Journal
Abstract
We propose a novel optical encryption scheme for cipher-feedback-block (CFB) mode, capable of encrypting two-dimensional (2D) page data with the use of two-step phase-shifting digital interferometry utilizing orthogonal polarization, in which the CFB algorithm is modified into an optical method to enhance security. The encryption is performed in the Fourier domain to record interferograms on charge-coupled devices (CCD)s with 256 quantized gray levels. A page of plaintext is encrypted into digital interferograms of ciphertexts, which are transmitted over a digital information network and then can be decrypted by digital computation according to the given CFB algorithm. The encryption key used in the decryption procedure and the plaintext are reconstructed by dual phase-shifting interferometry, providing high security in the cryptosystem. Also, each plaintext is sequentially encrypted using different encryption keys. The random-phase mask attached to the plaintext provides resistance against possible attacks. The feasibility and reliability of the proposed CFB method are verified and analyzed with numerical simulations.
Keywords
CFB mode; Digital holography; Optical encryption; Phase-shifting interferometry; Symmetric block encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).   DOI
2 O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128-1148 (2009).   DOI
3 A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589-636 (2009).   DOI
4 W. Chen, B. Javidi, and X. Chen, "Advances in optical security systems," Adv. Opt. Photonics 6, 120-155 (2014).   DOI
5 B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, "Roadmap on optical security," J. Opt. 18, 083001 (2016).   DOI
6 B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000).   DOI
7 E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt. 39, 2313-2320 (2000).   DOI
8 L.-Z Cai, M.-Z He, Q. Liu, and X.-L Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004).   DOI
9 C. Mela and C. Iemmi, "Optical encryption using phase-shifting interferometry in a joint transform correlator," Opt. Lett. 31, 2562-2564 (2006).   DOI
10 X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006).   DOI
11 H. Li, "Image encryption based on gyrator transform and two-step phase-shifting interferometry," Opt. Lasers Eng. 47, 45-50 (2009).   DOI
12 X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, "Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm," J. Opt. A: Pure Appl. Opt. 11, 085402 (2009).   DOI
13 N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, "Optical image encryption based on interference of polarized light," Opt. Express 17, 13418-13424 (2009).   DOI
14 S.-H. Jeon and S.-K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011).   DOI
15 D. Fan, X. Meng, Y. Wang, X. Yang, X. Peng, W. He, G. Dong, and H. Chen, "Asymmetric cryptosystem and software design based on two-step phase-shifting interferometry and elliptic curve algorithm," Opt. Commun. 309, 50-56 (2013).   DOI
16 B. Javidi and T. Nomura, "Polarization encoding for optical security systems," Opt. Eng. 39, 2439-2443 (2000).   DOI
17 J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, "Multiplexing encrypted data by using polarized light," Opt. Commun. 260, 109-112 (2006).   DOI
18 U. Gopinathan, T. J. Naughton, and J. T. Sheridan, "Polarization encoding and multiplexing of two-dimensional signals: application to image encryption," Appl. Opt. 45, 5693-5700 (2006).   DOI
19 A. Alfalou1 and C. Brosseau, "Dual encryption scheme of images using polarized light," Opt. Lett. 35, 2185-2187 (2010).   DOI
20 S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012).   DOI
21 T. J. Naughton, B. M. Hennelly, and T. Dowling, "Introducing secure modes of operation for optical encryption," J. Opt. Soc. Am. A 25, 2608-2617 (2008).   DOI
22 S.-H. Jeon and S.-K. Gil, "Optical implementation of cipher block chaining mode algorithm using phase-shifting digital holography," Opt. Eng. 55, 123112 (2016).   DOI