An optical encryption and authentication scheme using asymmetric keys.

We propose a novel optical information encryption and authentication scheme that uses asymmetric keys generated by the phase-truncation approach and the phase-retrieval algorithm. Multiple images bonded with random phase masks are Fourier transformed, and obtained spectra are amplitude- and phase-truncated. The phase-truncated spectra are encoded into a single random intensity image using the phase-retrieval algorithm. Unlike most of the authentication schemes, in this study, only one encrypted reference image is required for verification of multiple secured images. The conventional double random phase encoding and correlation techniques are employed for authentication verification. Computer simulation results and theoretical explanation prove the effectiveness of the proposed scheme.

[1]  Naveen K. Nishchal,et al.  Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm. , 2014, Applied optics.

[2]  Hone-Ene Hwang,et al.  Lensless optical data hiding system based on phase encoding algorithm in the Fresnel domain. , 2013, Applied optics.

[3]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[4]  Bahram Javidi,et al.  Watermarking of three-dimensional objects by digital holography. , 2003, Optics letters.

[5]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[6]  A. Alfalou,et al.  Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption. , 2010, Optics letters.

[7]  Bahram Javidi,et al.  Security optical systems based on a joint transform correlator with significant output images , 2001, Optical Engineering.

[8]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[9]  Myungjin Cho,et al.  3D passive photon counting automatic target recognition using advanced correlation filters. , 2011, Optics letters.

[10]  Yixiang Chen,et al.  Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. , 2014, Applied optics.

[11]  Ayman Alfalou,et al.  Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction , 2013 .

[12]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[13]  Xiaogang Wang,et al.  A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .

[14]  Naveen K. Nishchal,et al.  Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem , 2013 .

[15]  R. Gerchberg A practical algorithm for the determination of phase from image and diffraction plane pictures , 1972 .

[16]  D Mendlovic,et al.  Gerchberg-Saxton algorithm applied in the fractional Fourier or the Fresnel domain. , 1996, Optics letters.

[17]  Naveen K Nishchal,et al.  Image encryption based on interference that uses fractional Fourier domain asymmetric keys. , 2012, Applied optics.

[18]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[19]  Naveen K. Nishchal Hierarchical encrypted image watermarking using fractional Fourier domain random phase encoding , 2011 .

[20]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[21]  Naveen K Nishchal,et al.  Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. , 2012, Applied optics.

[22]  B. Javidi Nonlinear joint power spectrum based optical correlation. , 1989, Applied optics.

[23]  Bahram Javidi,et al.  Photon-counting double-random-phase encoding for secure image verification and retrieval , 2012 .

[24]  Daomu Zhao,et al.  Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask. , 2013, Optics letters.

[25]  Bahram Javidi,et al.  Full-phase photon-counting double-random-phase encryption. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[26]  Bahram Javidi,et al.  Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.

[27]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[28]  Myungjin Cho,et al.  Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.

[29]  Bahram Javidi,et al.  Optical pattern recognition for validation and security verification , 1994 .

[30]  Roberto Torroba,et al.  Optical encryption and QR codes: secure and noise-free information retrieval. , 2013, Optics express.

[31]  José A. Rodrigo,et al.  Applications of gyrator transform for image processing , 2007 .

[32]  Naveen K. Nishchal,et al.  Image encryption and authentication verification using fractional nonconventional joint transform correlator , 2012 .

[33]  Linfei Chen,et al.  Optical image encryption based on fractional wavelet transform , 2005 .

[34]  Naveen K Nishchal,et al.  Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain. , 2013, Applied optics.

[35]  Naveen K Nishchal,et al.  Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. , 2013, Applied optics.

[36]  Ayman Alfalou,et al.  Dual encryption scheme of images using polarized light. , 2010, Optics letters.