A technique for image encryption using digital signature

We propose a new technique to encrypt an image for secure image transmission. The digital signature of the original image is added to the encoded version of the original image. The encoding of the image is done using an appropriate error control code, such as a Bose-Chaudhuri Hochquenghem (BCH) code. At the receiver end, after the decryption of the image, the digital signature can be used to verify the authenticity of the image. Detailed simulations have been carried out to test the encryption technique. An optical correlator, in either the JTC or the VanderLugt geometry, or a digital correlation technique, can be used to verify the authenticity of the decrypted image.

[1]  A. VanderLugt,et al.  Optical Signal Processing , 1990 .

[2]  John Braun,et al.  Internet security , 2001 .

[3]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[4]  Kehar Singh,et al.  Double random fractional Fourier domain encoding for optical security , 2000 .

[5]  J. Goodman Introduction to Fourier optics , 1969 .

[6]  Luiz Goncalves Neto Implementation of image encryption using the phase-contrast technique , 1998, Defense + Commercial Sensing.

[7]  Paul Kahn,et al.  IRIS hypermedia services , 1992, CACM.

[8]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[9]  Bahram Javidi,et al.  Fully phase encrypted image processor , 1999 .

[10]  G Unnikrishnan,et al.  Optical encryption system that uses phase conjugation in a photorefractive crystal. , 1998, Applied optics.

[11]  Nobukatsu Takai,et al.  Digital watermarking by a holographic technique. , 2002, Applied optics.

[12]  R. Blahut Theory and practice of error control codes , 1983 .

[13]  Y Li,et al.  Security and encryption optical systems based on a correlator with significant output images. , 2000, Applied optics.

[14]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[15]  S Liu,et al.  Optical image encryption based on multifractional Fourier transforms. , 2000, Optics letters.

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[17]  Bahram Javidi,et al.  Information hiding technique with double phase encoding. , 2002, Applied optics.

[18]  Bahram Javidi,et al.  Security optical systems based on a joint transform correlator with significant output images , 2001, Optical Engineering.

[19]  Zeev Zalevsky,et al.  A new optical random coding technique for security systems , 2000 .

[20]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[21]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[22]  B Javidi,et al.  Securing information by use of digital holography. , 2000, Optics letters.

[23]  Hans J. Tiziani,et al.  Optical detection of random features for high security applications , 1998 .