Modified optical asymmetric image cryptosystem based on coherent superposition and equal modulus decomposition

被引:26
作者
Cai, Jianjun [1 ]
Shen, Xueju [1 ]
机构
[1] Mech Engn Coll, Dept Elect & Opt, Shijiazhuang 050003, Peoples R China
关键词
Data processing by optical means; Optical security and encryption; Asymmetric cryptosystem; INFORMATION ENCRYPTION; ATTACK; COMPRESSION;
D O I
10.1016/j.optlastec.2017.04.018
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose a modified optical asymmetric cryptosystem based on coherent superposition and equal modulus decomposition (EMD). In the encryption process, the asymmetric cells of the previous cryptosystem is cascaded, while some small changes are made. In the first cell, only one mask, whose phase is not equal with the public key, is generated to be used as the input of the second cell. As a consequence, the modified cryptosystem decreases available constrain conditions for attackers, resulting in a high robustness of the cryptosystem against the attack based on iterative Fourier transform. Furthermore, the modified scheme maintains the good performance of our previous cryptosystem, especially the benefit of key management. Some numerical simulations are presented to verify the validity and the performance of the modified cryptosystem. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:105 / 112
页数:8
相关论文
共 36 条
[1]   Mode purities of Laguerre-Gaussian beams generated via complex-amplitude modulation using phase-only spatial light modulators [J].
Ando, Taro ;
Ohtake, Yoshiyuki ;
Matsumoto, Naoya ;
Inoue, Takashi ;
Fukuchi, Norihiro .
OPTICS LETTERS, 2009, 34 (01) :34-36
[2]   Security-enhanced asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition [J].
Cai, Jianjun ;
Shen, Xueju ;
Lin, Chao .
OPTICS COMMUNICATIONS, 2016, 359 :26-30
[3]   Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition [J].
Cai, Jianjun ;
Shen, Xueju ;
Lei, Ming ;
Lin, Chao ;
Dou, Shuaifeng .
OPTICS LETTERS, 2015, 40 (04) :475-478
[4]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[5]   Advances in optical security systems [J].
Chen, Wen ;
Javidi, Bahram ;
Chen, Xudong .
ADVANCES IN OPTICS AND PHOTONICS, 2014, 6 (02) :120-155
[6]   Three-dimensional photon counting double-random-phase encryption [J].
Cho, Myungjin ;
Javidi, Bahram .
OPTICS LETTERS, 2013, 38 (17) :3198-3201
[7]  
Deng X., 2015, OPT LETT, V25, P887
[8]   Lensless multiple-image optical encryption based on improved phase retrieval algorithm [J].
Huang, Jian-Ji ;
Hwang, Hone-Ene ;
Chen, Chun-Yuan ;
Chen, Ching-Mu .
APPLIED OPTICS, 2012, 51 (13) :2388-2394
[9]   Securing information by use of digital holography [J].
Javidi, B ;
Nomura, T .
OPTICS LETTERS, 2000, 25 (01) :28-30
[10]  
Javidi B., 2005, Optical and Digital Techniques for Information Security