DOI QR코드

DOI QR Code

스크램블 연산 및 위상 천이 디지털 홀로그래피 기반 영상 이중 암호화

Double Encryption of Image Based on Scramble Operation and Phase-Shifting Digital Holography

  • 김철수 (경주대학교 전기에너지컴퓨터공학과)
  • 투고 : 2018.07.10
  • 심사 : 2018.08.08
  • 발행 : 2018.08.31

초록

본 논문에서는 스크램블 연산(Scramble Operation) 및 위상 천이 디지털 홀로그래피(PSDH; Phase Shift Digital Holography) 기반 영상 이중 암호화 방법을 제안한다. 암호화하고자 하는 영상을 스크램블 연산을 통해 디지털적으로 1차 암호화를 수행한 후, 위상 변조하고, 위상을 천이시킨 기준파와의 간섭을 통해 2차 암호화 정보를 얻는다. 복호화 과정은 암호화 과정의 역순으로 진행된다. 두 개의 암호화된 영상들을 적절하게 산술 처리하는 위상 천이 디지털 홀로그래피 기술을 통해 디지털적으로 1차 복호화하고, 위상 복조를 한 후, 스크램블 연산 시에 사용한 암호화 키 정보를 이용하여 원래의 영상을 복원한다. 제안된 암호화 방법은 스크램블 연산에 사용된 두 개의 키 정보와 위상 천이 디지털홀로그래피 기술에서 사용된 거리 정보, 광원의 파장 등의 정보를 모두 정확하게 알아야만 원래의 영상을 복원할 수 있다.

In this paper, double encryption technology of image based on scramble operation and phase-shifting digital holography is proposed. For the purpose, we perform first encryption digitally using scramble operation for the to be encrypted image, and perform phase modulation to the first encrypted image. Finally, we get the secondary encryption information through the interference between the phase-shifted reference wave and phase modulated image. The decryption process proceeds in the reverse order of the encryption process. The original image is reconstructed by digitally decoding the two encrypted images through a phase shift digital holography technique that appropriately performs arithmetic processing, phase-demodulating and then using the encryption key information used in the scramble operation. The proposed cryptosystem can recover the original image only if both the key information used in the scramble operation, the distance information used in the phase shift digital holography technique, and the wavelength of the light source are known accurately.

키워드

참고문헌

  1. Kim, T. H., Shin, H. D., and Park, S. H., "Software Protection Strategy through Digital Rights ,Anagement: Two Cases of Korean Firms," Journal of Internet Electronic Commerce Research, Vol. 9, No. 1, pp. 359-379, 2009.
  2. Han, H. H., and Chang, H. S., "The Behavioral Model of Digital Music Piracy on the Web," Journal of Information Systems, Vol. 16, No. 1, pp. 135-158, 2007.
  3. Refregier, P., and Javidi B., “Optical Image Encryption Based on Input Plane and Fourier Plane Random Encoding,” Opt. Lett., Vol. 32, No. 7, pp. 767-769, 1995. https://doi.org/10.1364/OL.32.000767
  4. Han, J. W., Park, C. S., Ryu, D. H., and Kim, E. S., “Optical Image Encryption Based on XOR Operations,” Opt. Eng., Vol. 38, No. 1, pp. 47-54, 1999. https://doi.org/10.1117/1.602060
  5. Mogensen, P. C., and Gluckstad, J., "A Phase-Based Optical Encryption System with Polarisation Encoding," Opt. Commu., Vol. 173, pp. 187-183, 2000.
  6. Javidi, B., and Nomura, T., “Securing Information by Use of Digital Holography,” Opt. Lett., Vol. 25, No. 1, pp. 28-30, 2000. https://doi.org/10.1364/OL.25.000028
  7. Kreis, T. M., and Juptner, W. P. O., “Suppression of the DC Term in Digital Holography,” Opt. Eng., Vol. 36, No. 8, pp. 2357-2360, 1997. https://doi.org/10.1117/1.601426
  8. Chen, G. L., Lin, C. Y., Kuo, M. K., and Chang, C. C., “Numerical Suppression of Zero-Order Image in Digital Holography,” Opt. Express, Vol. 15, No. 14, pp. 8851-8856, 2007. https://doi.org/10.1364/OE.15.008851
  9. Yamagichi I., "Phase-Shifting Digital Holography", Opt. Lett., Vol. 22, No. 16, pp. 1268-1270, 1997. https://doi.org/10.1364/OL.22.001268
  10. Liu, J. P., Poon, T. C., Jhou, G. S., and Chen, P. J., "Comparison of Two-, Three-, and Four-Exposure Quadrature Phase-Shifting Holography," Appl. Opt., Vol. 50, No. 16, pp. 2443-2450, 2011. https://doi.org/10.1364/AO.50.002443
  11. Zhang,, S., and Zhou, J., “A New Estimation Method for Two-Step-only Quadrature Phase-Shifting Digital Holography,” Opt. Commu., Vol. 335, No. 1, pp. 183-188, 2015. https://doi.org/10.1016/j.optcom.2014.08.068
  12. Yang, T. D., Kim, H. J., Lee, K. J., Kim, B. M., and Choi, Y., "Single-Shot and Phase-Shifting Digital Holography Microscopy Using a 2-D Grating," Optics Express, Vol. 24, No. 9, pp. 9480-9488, 2016. https://doi.org/10.1364/OE.24.009480
  13. Kim, C. S., "Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking," Journal of the Korea Industrial Information Systems Research, Vol. 22, No. 4, pp. 1-9, 2017. https://doi.org/10.9723/JKSIIS.2017.22.4.001
  14. Kim, C. S., "Digital Image Watermarking Technique Using Scrambled Binary Phase Computer Generated Hologram in Discrete Cosine Transform Domain," Journal of Korea Multimedia Society, Vol. 14, No. 3, pp. 403-413, 2010. https://doi.org/10.9717/kmms.2011.14.3.403
  15. Poon, T. C., "Digital Holography and Three-Dimensional Display: Principles and Applications," Springer, 2006.