DOI QR코드

DOI QR Code

Hierarchical Image Encryption System Using Orthogonal Method

직교성을 이용한 계층적 영상 암호화

  • Kim, Nam-Jin (School of Information & Communication, Kyungpook National University) ;
  • Seo, Dong-Hoan (Division of Electrical & Electronics Engineering, Korea Maritime Univerity) ;
  • Lee, Sung-Geun (Division of Electrical & Electronics Engineering, Korea Maritime Univerity) ;
  • Shin, Chang-Mok (School of Electrical Engineering & Computer Science, Kyungpook National University) ;
  • Cho, Kyu-Bo (School of Electrical Engineering & Computer Science, Kyungpook National University) ;
  • Kim, Soo-Joong (School of Electrical Engineering & Computer Science, Kyungpook National University)
  • 김남진 (경북대학교 정보통신학과) ;
  • 서동환 (한국해양대학교 전기전자공학부) ;
  • 이성근 (한국해양대학교 전기전자공학부) ;
  • 신창목 (경북대학교 전자전기컴퓨터학부) ;
  • 조규보 (경북대학교 전자전기컴퓨터학부) ;
  • 김수중 (경북대학교 전자전기컴퓨터학부)
  • Published : 2006.03.01

Abstract

In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.

본 논문에서는 직교성의 특성을 가진 Walsh code 영상과 무작위 위상 영상을 이용하여 계층적인 영상의 암호화 및 복호화로 영상 정보의 수준에 따른 효율적인 정보보호와, 암호화의 수준을 향상시키는 방법을 제안하였다. 제안한 암호화 과정은 각각의 원 영상과 무작위 위상 영상을 곱한 영상을 푸리에 변환 후, Walsh code 영상과 이진 무작위 위상영상을 곱한 영상에 확산시켜 암호화한다. 복호화 키는 암호화 과정에 사용된 Walsh code 영상을 정보의 수준에 따라 더함으로써 계층적인 복호화 키를 생성한다. 그러므로 하나의 복호화 키로도 정보 보호의 수준에 따라 각 암호화 영상을 복호화할 수 있다. 또한 이진 무작위 위상과 무작위 위상 영상은 암호화 영상을 백색 잡음의 패턴과 유사하여 암호화 수준이 높은 장점을 가진다. 컴퓨터 실험과 고찰을 통하여 암호화의 적합함을 확인하였다.

Keywords

References

  1. P. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Optics Letters, vol. 20, no. 7, pp. 767-769, 1995 https://doi.org/10.1364/OL.20.000767
  2. B. Javidi and E. Ahouzi, 'Optical security system whth Fourier plan encoding,' Applied Optics, vol. 37, no. 26, pp. 6247-6255, 1998 https://doi.org/10.1364/AO.37.006247
  3. B. Javidi, G. Zhang, and J. Li, 'Encrypted optical memory using double-random phase encoding,' Applied Optics, vol. 36, no. 5, pp. 1054-1058, 1997 https://doi.org/10.1364/AO.36.001054
  4. E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, 'Optolectronic information encryption with phase-shifting interferometry,' Applied Optics, vol. 39, no. 14, pp. 2313-2320, 2000 https://doi.org/10.1364/AO.39.002313
  5. R. K. Wang, I. A. Watson, and C. Chatwin, 'Random phase encoding for optical security,' Optical Engineering, vol. 35, No. 9, pp. 2464-2469, 1996 https://doi.org/10.1117/1.600849
  6. J. W. Goodman, Introduction to Fourier Optics, 2nd ed., McGraw-Hill, New York, 1996
  7. C. H. Yen, H. T. Chang, H. C. Chien, and C. J. Kuo, 'Design of caseaded phase Keys for a hierarchical security system,' Applied Optics, vol. 41, no. 29, pp. 6128-6314, 2002 https://doi.org/10.1364/AO.41.006128
  8. R. C. Gonzalez and R. E. Woods, Digital Image Processing, 2nd ed., Prentice-Hall, Upper Saddle River, 2002
  9. P-L. Lin, 'Robust transparent image watermarking system with spatial mechnisms,' The Journal of Systems and Software, vol. 50, pp. 107-116, 2000 https://doi.org/10.1016/S0164-1212(99)00081-3
  10. N. Nikolaidis and L. Pitas, 'Robust image watermarking in the spatial domain,' Signal Processing, vol. 66, no. 3, pp. 384-403, 1998
  11. A. B. Sewaif, M. Al-Muall, and H. Al-Ahmad, '2-D Walsh coding for robust digital image watermarking,' Proc. IEEE ISSPIT 2004, pp. 302-305, 2004
  12. S. Kishk and B. Javidi, 'Information hiding technique with double phase encoding,' Applied Optics, vol. 41, no. 26, pp. 5462-5470, 2002 https://doi.org/10.1364/AO.41.005462
  13. G. Situ and J. Zhang, 'A lensless optical security system based on computer-generated phase only masks,' Optics Communications, vol. 232, pp 115-122, 2004 https://doi.org/10.1016/j.optcom.2004.01.002