Asymmetric cryptosystem and software design based on two-step phase-shifting interferometry and elliptic curve algorithm

被引:9
作者
Fan, Desheng [1 ,2 ]
Meng, Xiangfeng [1 ,2 ]
Wang, Yurong [1 ,2 ]
Yang, Xiulun [1 ,2 ]
Peng, Xiang [3 ]
He, Wenqi [3 ]
Dong, Guoyan [4 ]
Chen, Hongyi [5 ]
机构
[1] Shandong Univ, Sch Informat Sci & Engn, Dept Opt, Jinan 250100, Peoples R China
[2] Shandong Univ, Shandong Prov Key Lab Laser Technol & Applicat, Jinan 250100, Peoples R China
[3] Shenzhen Univ, Coll Optoelect Engn, Shenzhen 518060, Peoples R China
[4] Univ Chinese Acad Sci, Coll Mat Sci & Optoelect Techol, Beijing 100049, Peoples R China
[5] Shenzhen Univ, Coll Elect Sci & Technol, Shenzhen 518060, Peoples R China
基金
中国国家自然科学基金;
关键词
Image encryption; Public key; Phase-shifting interferometry; OPTICAL-IMAGE ENCRYPTION; FRACTIONAL FOURIER-DOMAIN; VIRTUAL-OPTICS; DIGITAL HOLOGRAPHY; FRESNEL DOMAIN; INFORMATION; CRYPTOGRAPHY; SYSTEM; WATERMARKING; SECURITY;
D O I
10.1016/j.optcom.2013.06.044
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose an asymmetric cryptosystem based on two-step phase-shifting interferometry (PSI) and elliptic curve (EC) public-key cryptographic algorithm, in which one image is encrypted to two interferograms by double random-phase encoding (DRPE) in Fresnel domain and two-step PSI, and the session keys such as geometrical parameters and pseudo-random seeds, are asymmetrically encoded and decoded with the aid of EC algorithm. The receiver, who possesses the corresponding private key generated by EC algorithm, can successfully decipher the transmitted data using the extracted session keys. The utilization of EC asymmetric cryptosystem solves the problem of key management and dispatch, which is inevitable in the conventional optical symmetric cryptosystems. Not only computer simulation, but also software design and development are carried out to verify the feasibility of the proposed cryptosystem. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:50 / 56
页数:7
相关论文
共 36 条
[1]  
[Anonymous], J MATH COMPUTATION
[2]   Digital image encryption and watermarking by phase-shifting interferometry [J].
Cai, LZ ;
He, MZ ;
Liu, Q ;
Yang, XL .
APPLIED OPTICS, 2004, 43 (15) :3078-3084
[3]   Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms [J].
Chen, Linfei ;
Zhao, Daomu .
OPTICS EXPRESS, 2006, 14 (19) :8552-8560
[4]   Optical encryption using multiple intensity samplings in the axial domain [J].
Chen, Wen ;
Chen, Xudong ;
Anand, Arun ;
Javidi, Bahram .
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, 2013, 30 (05) :806-812
[5]   Security-enhanced interference-based optical image encryption [J].
Chen, Wen ;
Chen, Xudong .
OPTICS COMMUNICATIONS, 2013, 286 :123-129
[6]   Optical image encryption based on diffractive imaging [J].
Chen, Wen ;
Chen, Xudong ;
Sheppard, Colin J. R. .
OPTICS LETTERS, 2010, 35 (22) :3817-3819
[7]  
Hankerson D, 2004, Guide to Elliptic Curve Cryptography
[8]   Optical image encryption by random shifting in fractional Fourier domains [J].
Hennelly, B ;
Sheridan, JT .
OPTICS LETTERS, 2003, 28 (04) :269-271
[9]  
KAPOOR V, 2008, ACM UBIQUITY, V9, P1
[10]   Encryption of digital hologram of 3-D object by virtual optics [J].
Kim, H ;
Kim, DH ;
Lee, YH .
OPTICS EXPRESS, 2004, 12 (20) :4912-4921