Multidimensional data encryption with digital holography.docx

上传人:b****5 文档编号:3148743 上传时间:2022-11-18 格式:DOCX 页数:16 大小:68.70KB
下载 相关 举报
Multidimensional data encryption with digital holography.docx_第1页
第1页 / 共16页
Multidimensional data encryption with digital holography.docx_第2页
第2页 / 共16页
Multidimensional data encryption with digital holography.docx_第3页
第3页 / 共16页
Multidimensional data encryption with digital holography.docx_第4页
第4页 / 共16页
Multidimensional data encryption with digital holography.docx_第5页
第5页 / 共16页
点击查看更多>>
下载资源
资源描述

Multidimensional data encryption with digital holography.docx

《Multidimensional data encryption with digital holography.docx》由会员分享,可在线阅读,更多相关《Multidimensional data encryption with digital holography.docx(16页珍藏版)》请在冰豆网上搜索。

Multidimensional data encryption with digital holography.docx

Multidimensionaldataencryptionwithdigitalholography

Multidimensionaldataencryptionwithdigitalholography

LingfengYu

andLilongCai

DepartmentofMechanicalEngineering,HongKongUniversityofScienceandTechnology,ClearWaterBay,Kowloon,HongKong

Received10May2002; 

revised28September2002; 

accepted2December2002. ;

Availableonline11December2002.

Abstract

Anewmethodbasedontheconceptofvirtualopticsforbothencryptionanddecryptionisproposed.Itanalyzesthepotentialreasonsofthelimitationsofourearlierworkandpresentssomenewapproachtoimprovetheoriginalalgorithm.Differentmethodsofnumericalreconstructionfordataencryptionarecompared,thelimitationscausedbyoff-axissetupsarediscussed,andtheresolutionofthedecryptedimagecouldbeflexiblyadjusted,whichmakesitpossibletodecrypttheimagewithvirtuallynolossofdata.Numericalexperimentsareperformedtovalidatetheproposedmethod,andsensitivitiesofsomeparametersarequantitativelyanalyzedandillustrated.

AuthorKeywords:

Informationsecurity;Encryption/decryption;Digitalholography;Virtualoptics

ArticleOutline

1.Introduction

2.Differentmethodsfordigitalholography

3.Principlesofencryptionwithvirtualoptics

3.1.Recordingahologramoftheobject

3.2.ReconstructionoftheobjectwithSMM

3.3.Implementationofdataencryptionanddecryption

4.Numericalexperimentsandresults

4.1.ComparingSMMwiththeFTM

4.2.Effectofdifferentsizeofthe“virtualhologram”

4.3.Sensitivitiesofdifferentparameters

5.Conclusion

Acknowledgements

References

1.Introduction

Informationhidingtechniqueshaverecentlybecomeimportantinanumberofapplicationareas.Digitalaudio,video,andpicturesareincreasinglyfurnishedwithdistinguishingbutimperceptiblemarks,whichmaycontainahiddencopyrightnoticeorserialnumberstopreventunauthorizedcopying.Militarycommunicationsystemmakesincreasinguseoftrafficsecuritytechniques,whichseektoconcealitssender,itsreceiver,oritsveryexistence,ratherthanmerelyconcealthecontentofamessageusingencryption.Similartechniquesareusedinsomemobilephonesystems,intellectualpropertiesprotections,andschemesproposedforelectroniccommunications.

Criminalstrytousewhatevertrafficsecuritypropertiesthatareprovidedinternationallyorotherwiseintheavailablecommunicationsystems.Acompetitionisgoingonbetweenthedevelopersofdatasecuritysystemsandcounterfeiters.Theraceisescalatingasthetechnologyforperpetratinginformationfraudbecomesincreasinglycommon.Asadvancedhigh-speedcomputersbecomemoreandmoreavailable,thetimerequiredtodecipheranencodedmessageisrapidlyreduced,thusevenhighlysophisticatedencryptiontechniquescouldbecomeincreasinglyvulnerable.Thisserioussituationisapowerfuldrivingforceforunceasingdevelopmentofvariousidentityauthenticationanddataencryptiontechnologies[1].Otherclosetechnologiesrelevanttodataencryptionintermsofdataprotectionandidentifyauthenticationarewatermarking[2]andbiometrics[3].

Overpastfewyears,someresearchershavestartedexploringvariousopticalmethodsfordataencryption,becauseopticalinformationprocessingtechniqueshaveobviousadvantagessuchasinherentparallelprocessingcapability,moredegreesoffreedom(e.g.,amplitude,phase,polarization,wavelength)forencryptionanddecryption,andhigh-leveldatasecurity,incontrasttotheirelectroniccounterparts.Forinstance,twoindependentrandom-phasemaskshavebeenusedinaconventionalopticalprocessorforencryptinganimage[4].Inthisapproach,thefirstrandommaskwasbondedwithaninputimage,andanotherwasplacedintheFourierplaneoftheprocessorforencryptingtheinputimage.TherandomphasemasksintheFourierplanecanserveasasecuritykeyfordecryption.Sincetheinputimageispositive,itispossibletoreconstructtheencryptedimage,withtheproperkey,fromitsFouriermagnitude.So,anopticalFouriertransformandstatisticalaveragingprocesswasemployedtodecodetheencryptedimage.Inanotherapproach[5],acomputer-generatedhologram(CGH)techniquehasbeenusedforsecurityauthentication.Apoint-orientedCGHandacell-orientedCGHaresynthesizedbyelectronicbeamlithographytogeneratemultipleimageplanes.EachreconstructedimageisroughlythesameasthatofaCGHcontainingonlyasinglewavefrontofthecorrespondingobject.Anotherexampleusingopticalmethodsforencipheringdataisthemethodofencryptingtwo-dimensionaldatabasedonorthogonal-phase-codemultiplexing[6].Recently,a“three-dimensionalkey”technique[7],withtworandom-phasemasksplacedinaFresneldomain,hasalsobeenproposedtoincreasethesecurityofopticalencryption.Thephase-conjugatetechniqueisem

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 法律文书 > 调解书

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1