搜索

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法

潘雪梅 孟祥锋 杨修伦 王玉荣 彭翔 何文奇 董国艳 陈红艺

引用本文:
Citation:

基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法

潘雪梅, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇, 董国艳, 陈红艺

Asymetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm

Pan Xue-Mei, Meng Xiang-Feng, Yang Xiu-Lun, Wang Yu-Rong, Peng Xiang, He Wen-Qi, Dong Guo-Yan, Chen Hong-Yi
PDF
导出引用
  • 结合相位恢复和像素行、列循环移动置乱技术, 本文提出了一种基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法, 通过菲涅耳域的相位恢复算法, 依次恢复并生成多幅图像各自所对应的输入平面的复振幅信息, 通过各自的行、列向量随机数对原始二值振幅模板进行行、列循环移动置乱操作来获得每幅图像的采样模板, 认证系统将多个复振幅场信息采样、叠加并空间复用, 同时, 行向量随机数和列向量随机数被RSA算法公钥编码成密文. 系统认证时, 认证方利用自己持有的私钥将密文解码成行向量随机数和列向量随机数, 通过行、列循环移动置乱变换后获得各自的采样模板, 合成的复振幅信息和采样模板等认证信息均放置在各自正确位置, 当认证系统被正确波长的平面波照射时, 在输出平面能获得输出图像, 通过计算、显示输出图像和对应认证图像的非线性相关系数峰值来判断认证是否成功.
    By combining the iterative phase retrieval algorithm in the Fresnel domain with the shift rotation permutation operations of row vectors and column vectors, a new kind of asymmetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm is proposed, where multiple complex amplitude information in the input plane is retrieved and generated by the phase retrieval algorithm in the Fresnel domain. In original binary amplitude mask, the row vector and column vectors random numbers are randomly generated in advance, such that each sampling mask for each authenticator is obtained by the shift rotation permutation operations of corresponding row vector and column vectors random numbers for original binary amplitude mask. Thus, one synthesized complex amplitude is generated by the operations of sampling, overlap and multiplexing, and then sent to the certification center for authentication use. At the same time, the row vector and column vectors random numbers are encoded to ciphers by the public keys of RSA algorithm, and then delivered to the corresponding authenticators. During the authentication process, the row vector and column vectors random numbers are first decoded by the private keys possessed by the authenticator; second, the authenticator’s sampling mask is reconstructed by the shift rotation permutation operations of the above decoded random numbers for original binary amplitude mask. Finally, the authenticator with other additional authentication keys is prompted to place the synthesized complex amplitude information and its sampling mask at the corresponding positions, when the system is illuminated by a plane wave with the correct wavelength. A recovered image is then recorded in the output plane, by calculating and displaying the nonlinear correlation coefficient between the recovered image and the certification image, if there exists a remarkable peak in its nonlinear correlation coefficient distributions, indicating that the authentication is successful. On the contrary, if there is no remarkable peak but uniformly distributed white noise in the map, the authentication process is a failure attempt. Any intruder with randomly generated forged authentication keys will end up with a failure which enhances the security of the system to some extent.
    • 基金项目: 国家自然科学基金(批准号:61275014,61307003,61171073,51102148,1110488)、山东省自然科学基金(批准号:ZR2011FQ011)、山东省科技计划项目(批准号:2011GGH20119)和山东省优秀中青年科学家科研奖励基金(批准号:BS2011DX023)资助的课题.
    • Funds: Project supported by the National Natural Science Foundation of China (Grant Nos. 61275014, 61307003, 61171073, 51102148, 1110488), the Natural Science Foundation of Shandong province, China (Grant No. ZR2011FQ011), the Natural Science and Technology programs of Shandong province, China (Grant No. 2011GGH20119), and the Research Award Fund for Outstanding Young Scientists of Shandong Province, China (Grant No. BS2011DX023).
    [1]

    Refrégier P, Javidi B 1995 Opt. Lett. 20 767

    [2]

    Liu S T, Mi Q L, Zhu B H 2001 Opt. Lett. 26 1242

    [3]

    Tao R, Xin Y, Wang Y 2003 Opt. Express 15 16067

    [4]

    Situ G, Zhang J 2003 Opt. Lett. 29 1584

    [5]

    Chen L F, Zhao D M 2006 Opt. Express 14 8552

    [6]

    Wang X G, Zhao D M, Jing F, Wei X F 2006 Opt. Express 14 1476

    [7]

    Meng X F, Cai L Z, Xu X F, Yang X L, Shen X X, Dong G Y, Wang Y W 2006 Opt. Lett. 31 1414

    [8]

    Fan D S, Meng X F, Yang X L, Wang Y R, Peng X, He W Q 2012 Acta. Phys. Sin. 61 244204 (in Chinese) [范德胜, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇 2012 61 244204]

    [9]

    Liu Z J, Guo Q, Xu L, Ahmad M A, Liu S T 2010 Opt. Express 18 12033

    [10]

    Zhou N R, Wang Y X, Gong L H 2011 Opt. Commun. 284 3234

    [11]

    Zhang Y, Wang B 2008 Opt. Lett. 33 2443

    [12]

    Chen W, Chen X 2013 Opt. Commun. 286 123

    [13]

    He W Q, Peng X, Meng X F, Liu X L 2013 Acta. Phys. Sin. 62 064205 (in Chinese) [何文奇, 彭翔, 孟祥锋, 刘晓利 2013 62 064205]

    [14]

    Wang R K, Watson I A, Chatwin C 1996 Opt. Eng. 35 2464

    [15]

    Li Y Z, Kreske K, Rosen J 2000 Appl. Opt. 39 5295

    [16]

    Situ G, Zhang J 2005 Opt. Commun. 245 55

    [17]

    Situ G, Zhang J 2003 Optik 114 473

    [18]

    Meng X F, Cai L Z, Yang X L, Shen X X, Dong G Y 2006 Appl. Opt. 45 3289

    [19]

    Meng X F, Cai L Z, Wang Y R, Yang X L, Xu X F, Dong G Y, Shen X X, Zhang H, Cheng X C 2007 J. Opt. A:Pure Appl. Opt. 9 1070

    [20]

    Huang J J, Hwang H E, Chen C Y, Chen C M 2012 Appl. Opt. 51 2388

    [21]

    Xu N, Chen X L, Yang G 2013 Acta. Phys. Sin. 62 084202 (in Chinese) [徐宁, 陈雪莲, 杨庚 2013 62 084202]

    [22]

    Chen W, Chen X D 2014 Opt. Commun. 318 128

    [23]

    Gong Q, Liu X Y, Li G Q, Qin Y 2013 Appl. Opt. 52 7486

    [24]

    Wang Q, Guo Q, Lei L 2014 Opt. Commun. 320 12

    [25]

    Wang Y, Quan C, Tay C J 2014 Opt. Commun. 330 91

    [26]

    Diffie W, Hellman M E 1976 IEEE T. Inform. Theory IT-22 644

    [27]

    Bruce S 1996 Applied Cryptography Second Edition:Protocols, Algorithms, and Scource Code in C (New York:John Wiley & Sons) pp 461-482

    [28]

    Rivest R, Shamir A, Adleman L 1978 Comm. ACM 21 120

    [29]

    Meng X F, Peng X, Cai L Z, Li A M, Gao Z, Wang Y R 2009 J. Opt. A:Pure Appl. Opt. 11 085402

    [30]

    Spagnolo G S, Simonetti C, Cozzella L 2005 J. Opt. A:Pure Appl. Opt. 7 333

    [31]

    Chen W, Chen X D, Stern A, Javidi B 2013 IEEE Photon. J. 5 6900113

  • [1]

    Refrégier P, Javidi B 1995 Opt. Lett. 20 767

    [2]

    Liu S T, Mi Q L, Zhu B H 2001 Opt. Lett. 26 1242

    [3]

    Tao R, Xin Y, Wang Y 2003 Opt. Express 15 16067

    [4]

    Situ G, Zhang J 2003 Opt. Lett. 29 1584

    [5]

    Chen L F, Zhao D M 2006 Opt. Express 14 8552

    [6]

    Wang X G, Zhao D M, Jing F, Wei X F 2006 Opt. Express 14 1476

    [7]

    Meng X F, Cai L Z, Xu X F, Yang X L, Shen X X, Dong G Y, Wang Y W 2006 Opt. Lett. 31 1414

    [8]

    Fan D S, Meng X F, Yang X L, Wang Y R, Peng X, He W Q 2012 Acta. Phys. Sin. 61 244204 (in Chinese) [范德胜, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇 2012 61 244204]

    [9]

    Liu Z J, Guo Q, Xu L, Ahmad M A, Liu S T 2010 Opt. Express 18 12033

    [10]

    Zhou N R, Wang Y X, Gong L H 2011 Opt. Commun. 284 3234

    [11]

    Zhang Y, Wang B 2008 Opt. Lett. 33 2443

    [12]

    Chen W, Chen X 2013 Opt. Commun. 286 123

    [13]

    He W Q, Peng X, Meng X F, Liu X L 2013 Acta. Phys. Sin. 62 064205 (in Chinese) [何文奇, 彭翔, 孟祥锋, 刘晓利 2013 62 064205]

    [14]

    Wang R K, Watson I A, Chatwin C 1996 Opt. Eng. 35 2464

    [15]

    Li Y Z, Kreske K, Rosen J 2000 Appl. Opt. 39 5295

    [16]

    Situ G, Zhang J 2005 Opt. Commun. 245 55

    [17]

    Situ G, Zhang J 2003 Optik 114 473

    [18]

    Meng X F, Cai L Z, Yang X L, Shen X X, Dong G Y 2006 Appl. Opt. 45 3289

    [19]

    Meng X F, Cai L Z, Wang Y R, Yang X L, Xu X F, Dong G Y, Shen X X, Zhang H, Cheng X C 2007 J. Opt. A:Pure Appl. Opt. 9 1070

    [20]

    Huang J J, Hwang H E, Chen C Y, Chen C M 2012 Appl. Opt. 51 2388

    [21]

    Xu N, Chen X L, Yang G 2013 Acta. Phys. Sin. 62 084202 (in Chinese) [徐宁, 陈雪莲, 杨庚 2013 62 084202]

    [22]

    Chen W, Chen X D 2014 Opt. Commun. 318 128

    [23]

    Gong Q, Liu X Y, Li G Q, Qin Y 2013 Appl. Opt. 52 7486

    [24]

    Wang Q, Guo Q, Lei L 2014 Opt. Commun. 320 12

    [25]

    Wang Y, Quan C, Tay C J 2014 Opt. Commun. 330 91

    [26]

    Diffie W, Hellman M E 1976 IEEE T. Inform. Theory IT-22 644

    [27]

    Bruce S 1996 Applied Cryptography Second Edition:Protocols, Algorithms, and Scource Code in C (New York:John Wiley & Sons) pp 461-482

    [28]

    Rivest R, Shamir A, Adleman L 1978 Comm. ACM 21 120

    [29]

    Meng X F, Peng X, Cai L Z, Li A M, Gao Z, Wang Y R 2009 J. Opt. A:Pure Appl. Opt. 11 085402

    [30]

    Spagnolo G S, Simonetti C, Cozzella L 2005 J. Opt. A:Pure Appl. Opt. 7 333

    [31]

    Chen W, Chen X D, Stern A, Javidi B 2013 IEEE Photon. J. 5 6900113

  • [1] 王子硕, 刘磊, 刘晨博, 刘珂, 钟志, 单明广. 数字差分-积分快速相位解包裹算法研究.  , 2023, 72(18): 184201. doi: 10.7498/aps.72.20230473
    [2] 单明广, 刘翔宇, 庞成, 钟志, 于蕾, 刘彬, 刘磊. 结合线性回归的离轴数字全息去载波相位恢复算法.  , 2022, 71(4): 044202. doi: 10.7498/aps.71.20211509
    [3] 吴迪, 蒋子珍, 喻欢欢, 张晨爽, 张娇, 林丹樱, 于斌, 屈军乐. 基于分数阶螺旋相位片的定量相位显微成像.  , 2021, 70(15): 158702. doi: 10.7498/aps.70.20201884
    [4] 周静, 张晓芳, 赵延庚. 一种基于图像融合和卷积神经网络的相位恢复方法.  , 2021, 70(5): 054201. doi: 10.7498/aps.70.20201362
    [5] 单明广, 刘翔宇, 庞成, 钟志, 于蕾, 刘彬, 刘磊. 结合线性回归的离轴数字全息去载波相位恢复算法.  , 2021, (): . doi: 10.7498/aps.70.20211509
    [6] 葛银娟, 潘兴臣, 刘诚, 朱健强. 基于相干调制成像的光学检测技术.  , 2020, 69(17): 174202. doi: 10.7498/aps.69.20200224
    [7] 孙腾飞, 卢鹏, 卓壮, 张文浩, 卢景琦. 基于单一分光棱镜干涉仪的双通路定量相位显微术.  , 2018, 67(14): 140704. doi: 10.7498/aps.67.20172722
    [8] 戚俊成, 陈荣昌, 刘宾, 陈平, 杜国浩, 肖体乔. 基于迭代重建算法的X射线光栅相位CT成像.  , 2017, 66(5): 054202. doi: 10.7498/aps.66.054202
    [9] 何江涛, 何文奇, 廖美华, 卢大江, 彭翔. 一种基于双光束干涉和非线性相关的身份认证方法.  , 2017, 66(4): 044202. doi: 10.7498/aps.66.044202
    [10] 王大勇, 王云新, 郭莎, 戎路, 张亦卓. 基于多角度无透镜傅里叶变换数字全息的散斑噪声抑制成像研究.  , 2014, 63(15): 154205. doi: 10.7498/aps.63.154205
    [11] 来志, 郭亮, 李小珍, 党文佳. 机器视觉在激光干涉测量d31中的应用.  , 2013, 62(18): 184207. doi: 10.7498/aps.62.184207
    [12] 刘宏展, 纪越峰. 一种基于角谱理论的改进型相位恢复迭代算法.  , 2013, 62(11): 114203. doi: 10.7498/aps.62.114203
    [13] 何文奇, 彭翔, 孟祥锋, 刘晓利. 一种基于双光束干涉的分级身份认证方法.  , 2013, 62(6): 064205. doi: 10.7498/aps.62.064205
    [14] 杨振亚, 郑楚君. 基于压缩传感的纯相位物体相位恢复.  , 2013, 62(10): 104203. doi: 10.7498/aps.62.104203
    [15] 范德胜, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇. 基于相移干涉术的光学信息隐藏系统的软件实现.  , 2012, 61(24): 244204. doi: 10.7498/aps.61.244204
    [16] 季超, 张凌云, 窦硕星, 王鹏业. 原子力显微镜观测生物大分子图像的一种处理方法.  , 2011, 60(9): 098703. doi: 10.7498/aps.60.098703
    [17] 孟祥锋, 彭翔, 蔡履中, 何文奇, 秦琬, 郭继平, 李阿蒙. 优化的两步相移算法在图像加密中的应用研究.  , 2010, 59(9): 6118-6124. doi: 10.7498/aps.59.6118
    [18] 孟祥锋, 蔡履中, 王玉荣, 彭翔. 两步广义相移干涉术的光学实验验证.  , 2009, 58(3): 1668-1674. doi: 10.7498/aps.58.1668
    [19] 黄燕萍, 祁春媛. 用相位恢复方法测量多孔光纤的三维折射率分布.  , 2006, 55(12): 6395-6398. doi: 10.7498/aps.55.6395
    [20] 于 斌, 彭 翔, 田劲东, 牛憨笨. 硬x射线同轴相衬成像的相位恢复.  , 2005, 54(5): 2034-2037. doi: 10.7498/aps.54.2034
计量
  • 文章访问数:  6760
  • PDF下载量:  692
  • 被引次数: 0
出版历程
  • 收稿日期:  2014-08-21
  • 修回日期:  2014-12-29
  • 刊出日期:  2015-06-05

/

返回文章
返回
Baidu
map