DOI QR코드

DOI QR Code

Double Random Phase Encryption using Orthogonal Encoding for Multiple-Image Transmission

  • Lee, In-Ho (Department of Electrical, Electronic, and Control Engineering, IITC, Hankyong National University) ;
  • Cho, Myungjin (Department of Electrical, Electronic, and Control Engineering, IITC, Hankyong National University)
  • Received : 2014.05.09
  • Accepted : 2014.06.10
  • Published : 2014.06.25

Abstract

In this paper we extend double random phase encryption (DRPE) using orthogonal encoding from single-image transmission to multiple-image transmission. The orthogonal encoding for multiple images employs a larger Hadamard matrix than that for a single image, which can improve security. We provide a scheme for DRPE with an orthogonal codec, and a method for orthogonal encoding/decoding for multiple-image transmission. Finally, simulation results verify that the DRPE using orthogonal encoding for multiple images is more secure than both the conventional DRPE and the DRPE using orthogonal encoding for a single image.

References

  1. S. Tsuji and T. Itoh, "An ID-based cryptosystem based on the discrete logarithm problem," IEEE Journal on Selected Areas in Communication 7, 467-473 (1989). https://doi.org/10.1109/49.17709
  2. A. Menezes, T. Okamoto, and S. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Tran. on Info. Th. 39, 1639-1646 (1993). https://doi.org/10.1109/18.259647
  3. P. Refregier and B. Javidi, "Optical-image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  4. Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). https://doi.org/10.1364/OE.15.010253
  5. O. Matoba and B. Javidi, "Encrypted optical storage with angular multiplexing," Appl. Opt. 38, 7288-7293 (1999). https://doi.org/10.1364/AO.38.007288
  6. T. Nomura and B. Javidi, "Optical encryption system with a binary key code," Appl. Opt. 39, 4783-4787 (2000). https://doi.org/10.1364/AO.39.004783
  7. D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, "Key-space analysis of double random phase encryption technique," Appl. Opt. 46, 6641-6647 (2007). https://doi.org/10.1364/AO.46.006641
  8. M. Singh, A. Kumar, and K. Singh, "Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption," Opt. Laser Technol. 40, 619-624 (2008). https://doi.org/10.1016/j.optlastec.2007.09.007
  9. M. Joshi, C. Shakher, and K. Singh, "Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys," Opt. Commun. 283, 2496-2505 (2010). https://doi.org/10.1016/j.optcom.2010.02.024
  10. Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, "Image encryption scheme by using iterative random phase encoding in gyrator transform domains," Opt. Lasers Eng. 49, 542-546 (2011). https://doi.org/10.1016/j.optlaseng.2010.12.005
  11. E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett. 36, 22-24 (2011). https://doi.org/10.1364/OL.36.000022
  12. Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, "Image encryption based on the random rotation operation in the fractional Fourier transform domains," Opt. Lasers Eng. 50, 1352-1358 (2012). https://doi.org/10.1016/j.optlaseng.2012.05.021
  13. T. Sarkadi and P. Koppa, "Quantitative security evaluation of optical encryption using hybrid phase- and amplitudemodulated keys," Appl. Opt. 51, 745-750 (2012). https://doi.org/10.1364/AO.51.000745
  14. P. Koppa, "Phase-to-amplitude data page conversion for holographic storage and optical encryption," Appl. Opt. 46, 3561-3571 (2007). https://doi.org/10.1364/AO.46.003561
  15. N. Towghi, B. Javidi, and Z. Luo, "Fully phase encrypted image processor," J. Opt. Soc. Am. A 16, 1915-1927 (1999).
  16. E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt. 39, 6595-6601 (2000). https://doi.org/10.1364/AO.39.006595
  17. H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, "Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack," Opt. Express 18, 13772-13781 (2010). https://doi.org/10.1364/OE.18.013772
  18. X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, "Secure optical memory system with polarization encryption," Appl. Opt. 40, 2310-2315 (2001). https://doi.org/10.1364/AO.40.002310
  19. J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, "Multiplexing encryption-decryption via lateral shifting of a random phase mask," Opt. Commun. 259, 532-536 (2006). https://doi.org/10.1016/j.optcom.2005.09.027
  20. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, "Optical encryption based on computational ghost imaging," Opt. Lett. 35, 2391-2393 (2010). https://doi.org/10.1364/OL.35.002391
  21. W. Chen and X. Chen, "Space-based optical image encryption," Opt. Express 18, 27095-27104 (2010). https://doi.org/10.1364/OE.18.027095
  22. G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000). https://doi.org/10.1364/OL.25.000887
  23. H.-Y. Tu, J.-S. Chiang, J.-W. Chou, and C.-J. Cheng, "Full phase encoding for digital holographic encryption using liquid crystal spatial light modulators," Jpn. J. Appl. Phys. 47, 8838-8843 (2008). https://doi.org/10.1143/JJAP.47.8838
  24. M. Cho and B. Javidi, "Three-dimensional photon counting double-random-phase encryption," Opt. Lett. 38, 3198-3201(2013). https://doi.org/10.1364/OL.38.003198
  25. M. Joshi, Chandrashakher, and K. Singh, "Color image encryption and decryption using fractional Fourier transform," Opt. Commun. 279, 35-42 (2007). https://doi.org/10.1016/j.optcom.2007.07.012
  26. I.-H. Lee and M. Cho, "Double random phase encryption based orthogonal encoding technique for color images," J. Opt. Soc. Korea 18, 129-133 (2014). https://doi.org/10.3807/JOSK.2014.18.2.129
  27. J. J. Sylvester, "Thoughts on orthogonal matrices, simultaneous sign successions, and tessellated pavements in two or more colors, with applications to Newton's rule, ornamental tilework, and the theory of numbers," Phil. Mag. 34, 461-475 (1867).

Cited by

  1. Image Authentication Using Only Partial Phase Information from a Double-Random-Phase-Encrypted Image in the Fresnel Domain vol.19, pp.3, 2015, https://doi.org/10.3807/JOSK.2015.19.3.241
  2. Information Authentication of Three-Dimensional Photon Counting Double Random Phase Encryption Using Nonlinear Maximum Average Correlation Height Filter vol.20, pp.2, 2016, https://doi.org/10.3807/JOSK.2016.20.2.228
  3. Optical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES vol.19, pp.6, 2015, https://doi.org/10.3807/JOSK.2015.19.6.592
  4. Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation vol.20, pp.4, 2016, https://doi.org/10.3807/JOSK.2016.20.4.476
  5. Accumulation Encoding Technique Based on Double Random Phase Encryption for Transmission of Multiple Images vol.18, pp.4, 2014, https://doi.org/10.3807/JOSK.2014.18.4.401
  6. Key Phase Mask Updating Scheme with Spatial Light Modulator for Secure Double Random Phase Encryption vol.13, pp.4, 2015, https://doi.org/10.6109/jicce.2015.13.4.280
  7. Asymmetric Multiple-Image Encryption Based on Octonion Fresnel Transform and Sine Logistic Modulation Map vol.20, pp.3, 2016, https://doi.org/10.3807/JOSK.2016.20.3.341
  8. Asymmetric Public Key Cryptography by Using Logic-based Optical Processing vol.20, pp.1, 2016, https://doi.org/10.3807/JOSK.2016.20.1.055
  9. Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain vol.20, pp.1, 2016, https://doi.org/10.3807/JOSK.2016.20.1.042