首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We propose and demonstrate a fractional Fourier domain encrypted holographic memory using an anamorphic optical system. The encryption is done by use of two statistically independent random-phase codes in the fractional Fourier domain. If the two random-phase codes are statistically independent white sequences, the encrypted data are stationary white noise. We exploit the capability of an optical system to process information in two dimensions by using two different sets of parameters along the two orthogonal axes to encode the data. The fractional Fourier transform parameters along with the random-phase codes constitute the key to the encrypted data. The knowledge of the key is essential to the successful decryption of data. The decoding of the encoded data is done by use of phase conjugation. We present a few experimental results.  相似文献   

2.
Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information in the most significant bits (MSB) of the encrypted pixels in smooth blocks and the final marked image can be obtained. At the receiver side, secret data will be extracted correctly with data-hiding key. When receiver only has encryption key, after stream cipher decryption, block scrambling decryption and MSB error prediction with threshold, decrypted image will be achieved. When data hiding key and encryption key are both obtained, receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly, hence, receiver can recover marked image losslessly. Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes.  相似文献   

3.
Poon TC  Kim T  Doh K 《Applied optics》2003,42(32):6496-6503
We propose a method for secure wireless transmission of encrypted information. By use of an encryption key, an image or document is optically encrypted by optical heterodyne scanning and hence encryption is performed on the fly. We call this technique optical scanning cryptography. The output of the heterodyne encrypted signal is at radio frequency and can be directly sent through an antenna to a secure site for digital storage to be prepared for decryption. In the secure site, an identical optical scanning system to that used for encryption is used, together with a decryption key, to generate an electrical signal. The electrical signal is then processed and sent to a computer to be used for decryption. Utilizing the stored information received from the encryption stage and the electrical information from the secure site, a digital decryption unit performs a decryption algorithm. If the encryption key and the decryption key are matched, the decryption unit will decrypt the image or document faithfully. The overall cryptosystem can perform the incoherent optical processing counterpart of the well-known coherent double-random phase-encoding technique. We present computer simulations of the idea.  相似文献   

4.
Ohtsubo J  Fujimoto A 《Applied optics》2002,41(23):4848-4855
A method of image encryption and decryption is proposed for optical security systems. A phase-coded image to be encrypted together with a random phase pattern is Fourier transformed and the result of the complex-valued data is used as an encrypted pattern. The decryption is simply performed by an inverse-Fourier transform for the addition of the encrypted pattern and the Fourier transform of the random phase. The intensity of the inverse-Fourier transformed image gives the exact result forthe decryption. Further, the binarization of the encrypted pattern is performed for the easiness of the optical and electronic readout of the images, and it also gives rise to the enhancement of the degree of security for the encryption. The binary pattern is optimized by a statistical iteration technique and an excellent decryption image is obtained by the optimization.  相似文献   

5.
Huang JJ  Hwang HE  Chen CY  Chen CM 《Applied optics》2012,51(13):2388-2394
A novel architecture of the optical multiple-image encryption based on the modified Gerchberg-Saxton algorithm (MGSA) by using cascading phase only functions (POFs) in the Fresnel transform (FrT) domain is presented. This proposed method can greatly increase the capacity of the system by avoiding the crosstalk, completely, between the encrypted target images. Each present stage encrypted target image is encoded as to a complex function by using the MGSA with constraining the encrypted target image of the previous stage. Not only the wavelength and position parameters in the FrT domain can be keys to increase system security, the created POFs are also served mutually as the encryption keys to decrypt target image from present stage into next stage in the cascaded scheme. Compared with a prior method [Appl. Opt.48, 2686-2692 (2009)], the main advantages of this proposed encryption system is that it does not need any transformative lenses and this makes it very efficient and easy to implement optically. Simulation results show that this proposed encryption system can successfully achieve the multiple-image encryption via fewer POFs, which is more advantageous in simpler implementation and efficiency than a prior method where each decryption stage requires two POFs to accomplish this task.  相似文献   

6.
Key-space analysis of double random phase encryption technique   总被引:1,自引:0,他引:1  
We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.  相似文献   

7.
Secure optical storage that uses fully phase encryption   总被引:6,自引:0,他引:6  
Tan X  Matoba O  Shimura T  Kuroda K  Javidi B 《Applied optics》2000,39(35):6689-6694
A secure holographic memory system that uses fully phase encryption is presented. Two-dimensional arrays of data are phase encoded. Each array is then transformed into a stationary white-noise-like pattern by use of a random-phase mask located at the input plane and another at the Fourier plane. This encrypted information is then stored holographically in a photorefractive LiNbO(3):Fe crystal. The original phase-encoded data can be recovered, by use of the two random-phase masks, with a phase-conjugate readout beam. This phase information can then be converted back to intensity information with an interferometer. Recording multiple images by use of angular multiplexing is demonstrated. The influence of a limited system bandwidth on the quality of reconstructed data is evaluated numerically. These computer simulation results show that a fully phase-based encryption system generally performs better than an amplitude-based encryption system when the system bandwidth is limited by a moderate amount.  相似文献   

8.
Meng XF  Cai LZ  Yang XL  Xu XF  Dong GY  Shen XX  Zhang H  Wang YR 《Applied optics》2007,46(21):4694-4701
A novel single-channel color-image watermarking with digital-optics means based on phase-shifting interferometry (PSI) and a neighboring pixel value subtraction algorithm in the discrete-cosine-transform (DCT) domain is proposed. The converted two-dimensional indexed image matrix from an original color image is encrypted to four interferograms by a PSI and double random-phase encoding technique. Then the interferograms are embedded in one chosen channel of an enlarged color host image in the DCT domain. The hidden color image can be retrieved by DCT, the improved neighboring pixel value subtraction algorithm, an inverse encryption process, and color image format conversion. The feasibility of this method and its robustness against some types of distortion and attacks from the superposed image with different weighting factors are verified and analyzed by computer simulations. This approach can avoid the cross-talk noise due to direct information superposition, enhance the imperceptibility of hidden data, and improve the efficiency of data transmission.  相似文献   

9.
目的 研究网络传输信息加密解密技术 .方法 基于对公钥密码体制的分析 ,研究 RSA密码体制的实现算法 ,设计系统程序模块 .结果 开发了端对端的网络传输信息加密解密系统 .结论 采用 RSA密码体制可以研制出安全性更高的网络传输信息加密解密系统  相似文献   

10.
Liu Z  Xu L  Lin C  Liu S 《Applied optics》2010,49(29):5632-5637
Based on an optical gyrator transform system, an image encryption algorithm is designed and studied. An original secret image is regarded as the output intensity of the second gyrator transform. A coherent nonuniform optical beam is converted into the input of the first gyrator transform. A Gerchberg-Saxton phase retrieval algorithm is employed for obtaining the compensation phases in the first gyrator transform pair. The compensation phases are regarded as the encrypted image and key in this algorithm. The parameters of the laser beam and gyrator transform can serve as the additional key of encryption method. The decryption process of this encryption algorithm can be achieved with an optical system. Numerical simulations are performed to test the validity and capability of the encryption algorithm.  相似文献   

11.
Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding schemes are proposed for encrypted image data in cloud computing: reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain. The former is that additional bits are extracted after decryption and the latter is that extracted before decryption. Meanwhile, a combined scheme is also designed. This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing, which not only ensures multimedia data security without relying on the trustworthiness of cloud servers, but also guarantees that reversible data hiding can be operated over encrypted images at the different stages. Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme. The computation cost of the proposed scheme is acceptable and adjusts to different security levels.  相似文献   

12.
We propose a novel image encryption algorithm based on compressive sensing (CS) and chaos in the fractional Fourier domain. The original image is dimensionality reduction measured using CS. The measured values are then encrypted using chaotic-based double-random-phase encoding technique in the fractional Fourier transform domain. The measurement matrix and the random-phase masks used in the encryption process are formed from pseudo-random sequences generated by the chaotic map. In this proposed algorithm, the final result is compressed and encrypted. The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys for distribution simultaneously. Numerical experiments verify the validity and security of the proposed algorithm.  相似文献   

13.
Abuturab MR 《Applied optics》2012,51(15):3006-3016
A novel method for encoding color information based on a double random phase mask and a double structured phase mask in a gyrator transform domain is proposed. The amplitude transmittance of the Fresnel zone plate is used as structured phase-mask encoding. A color image is first segregated into red, green, and blue component images. Each of these component images are then independently encrypted using first a random phase mask placed at the image plane and transmitted through the first structured phase mask. They are then encoded by the first gyrator transform. The resulting information is again encrypted by a second random phase mask placed at the gyrator transform plane and transmitted through the second structured phase mask, and then encoded by the second gyrator transform. The system parameters of the structured phase mask and gyrator transform in each channel serve as additional encryption keys and enlarge the key space. The encryption process can be realized with an electro-optical hybrid system. The proposed system avoids problems arising from misalignment and benefits of a higher space-bandwidth product. Numerical simulations are presented to confirm the security, validity, and possibility of the proposed idea.  相似文献   

14.
Matoba O  Javidi B 《Applied optics》2004,43(11):2285-2291
An optical three-dimensional (3D) display system interfaced with digital data transmission is proposed. In this system, an original 3D object is encrypted by use of a random phase mask and then the encrypted pattern is recorded as a digital hologram. The digital hologram key is also recorded for optical decryption. Both the encrypted digital hologram and the digital hologram key are transmitted to a receiver through a conventional communication data channel. At the receiver, the 3D scene is reconstructed and displayed optically in a retrieval system based on a joint-transform correlation. Experimental results are presented. We investigate the influence of quantization of the joint power spectrum in the optical correlator on the quality of the reconstructed image.  相似文献   

15.
In this paper, an explanation of the double random phase encryption technique using affine cryptography is proposed. The principle of this technique to decipher an optical image may be regarded as an optical realization of the affine cryptography. During the deciphering process of double random phase encryption based on the 4-f optical system, if there are errors in the random phase, which plays as a decryption key, these errors will be added to the encrypted image in the form of noise. The signal-to-noise ratio of the decrypted image has been analysed under the situation that the errors had occurred, both in the position of lateral direction and the value of the pixel function from the random phase mask. Furthermore, the fault tolerance of orientation in the decipher system has been discussed when only a part of the random phase mask is used.  相似文献   

16.
Seo DH  Shin CM  Kim SJ 《Applied optics》2004,43(20):4011-4016
We technically investigate the robustness of an image encryption technique that uses a virtual phase image and a joint transform correlator (JTC) in the frequency domain. An encrypted image is obtained by the Fourier transform of the product of a virtual phase image, which camouflages the original image, and a random phase image. The resulting image is then decrypted by use of a decrypting key made from the proposed phase assignment rule in order to enhance the level of security. We demonstrate that the encrypted image generated by the proposed JTC-based decryption technique is robust to data loss and image shift.  相似文献   

17.
Optoelectronic information encryption with phase-shifting interferometry   总被引:13,自引:0,他引:13  
A technique that combines the high speed and the high security of optical encryption with the advantages of electronic transmission, storage, and decryption is introduced. Digital phase-shifting interferometry is used for efficient recording of phase and amplitude information with an intensity recording device. The encryption is performed by use of two random phase codes, one in the object plane and another in the Fresnel domain, providing high security in the encrypted image and a key with many degrees of freedom. We describe how our technique can be adapted to encrypt either the Fraunhofer or the Fresnel diffraction pattern of the input. Electronic decryption can be performed with a one-step fast Fourier transform reconstruction procedure. Experimental results for both systems including a lensless setup are shown.  相似文献   

18.
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud. However, when applying CP-ABE to data outsourcing scenarios, we have to address the challenging issue of policy updates because access control elements, such as users, attributes, and access rules may change frequently. In this paper, we propose a notion of access policy updatable ciphertext-policy attribute-based encryption (APU-CP-ABE) by combining the idea of ciphertext-policy attribute-based key encapsulation and symmetric proxy re-encryption. When an access policy update occurs, data owner is no longer required to download any data for re-encryption from the cloud, all he needs to do is generate a re-encryption key and produce a new encapsulated symmetric key, and then upload them to the cloud. The cloud server executes re-encryption without decryption. Because the re-encrypted ciphertext is encrypted under a completely new key, users cannot decrypt data even if they keep the old symmetric keys or parts of the previous ciphertext. We present an APU-CP-ABE construction based on Syalim et al.’s [Syalim, Nishide and Sakurai (2017)] improved symmetric proxy re-encryption scheme and Agrawal et al.’s [Agrawal and Chase (2017)] attribute-based message encryption scheme. It requires only 6 bilinear pairing operations for decryption, regardless of the number of attributes involved. This makes our construction particularly attractive when decryption is time-critical.  相似文献   

19.
Xin Z  Sheng Y  Sheng-wei W  Jian X 《Applied optics》2006,45(33):8434-8439
An affine mapping mathematical expression of the double-random-phase encryption technique has been deduced utilizing the matrix form of discrete fractional Fourier transforms. This expression clearly describes the encryption laws of the double-random-phase encoding techniques based on both the fractional Fourier transform and the ordinary Fourier transform. The encryption process may be regarded as a substantial optical realization of the affine cryptosystem. It has been illustrated that the encryption process converts the original image into a white Gaussian noise with a zero-mean value. Also, the decryption process converts the data deviations of the encrypted image into white Gaussian noises, regardless of the type of data deviations. These noises superimpose on the decrypted image and degrade the signal-to-noise ratio. Numerical simulations have been implemented for the different types of noises introduced into the encrypted image, such as the white noise with uniform distribution probability, the white noise with Gaussian distribution probability, colored noise, and the partial occlusion of the encrypted image.  相似文献   

20.
Matoba O  Javidi B 《Applied optics》2000,39(17):2975-2981
An encrypted database interfaced with an ultrafast secure data communication system using spatial-temporal converters is proposed. The original spatial signal is optically encrypted, and the encrypted signal is holographically stored in a storage medium such as photorefractive materials. The spatially encrypted signal is sampled to avoid the overlap of each datum at the receiver. The sampled data are converted into a temporal signal to transmit the information through an optical fiber. At the receiver the temporal signal is converted back into the spatially encrypted signal. Retrieval of the original data can be achieved when the correct phase key is used in the decryption system. We developed an expression for encrypted output and decrypted data. We numerically evaluate the effect of sampling the spatially encrypted signal on the quality of the decrypted data.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号