-
By combining the iterative phase retrieval algorithm in the Fresnel domain with the shift rotation permutation operations of row vectors and column vectors, a new kind of asymmetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm is proposed, where multiple complex amplitude information in the input plane is retrieved and generated by the phase retrieval algorithm in the Fresnel domain. In original binary amplitude mask, the row vector and column vectors random numbers are randomly generated in advance, such that each sampling mask for each authenticator is obtained by the shift rotation permutation operations of corresponding row vector and column vectors random numbers for original binary amplitude mask. Thus, one synthesized complex amplitude is generated by the operations of sampling, overlap and multiplexing, and then sent to the certification center for authentication use. At the same time, the row vector and column vectors random numbers are encoded to ciphers by the public keys of RSA algorithm, and then delivered to the corresponding authenticators. During the authentication process, the row vector and column vectors random numbers are first decoded by the private keys possessed by the authenticator; second, the authenticator’s sampling mask is reconstructed by the shift rotation permutation operations of the above decoded random numbers for original binary amplitude mask. Finally, the authenticator with other additional authentication keys is prompted to place the synthesized complex amplitude information and its sampling mask at the corresponding positions, when the system is illuminated by a plane wave with the correct wavelength. A recovered image is then recorded in the output plane, by calculating and displaying the nonlinear correlation coefficient between the recovered image and the certification image, if there exists a remarkable peak in its nonlinear correlation coefficient distributions, indicating that the authentication is successful. On the contrary, if there is no remarkable peak but uniformly distributed white noise in the map, the authentication process is a failure attempt. Any intruder with randomly generated forged authentication keys will end up with a failure which enhances the security of the system to some extent.
-
Keywords:
- security authentication /
- phase retrieval /
- digital image processing
[1] Refrégier P, Javidi B 1995 Opt. Lett. 20 767
[2] Liu S T, Mi Q L, Zhu B H 2001 Opt. Lett. 26 1242
[3] Tao R, Xin Y, Wang Y 2003 Opt. Express 15 16067
[4] Situ G, Zhang J 2003 Opt. Lett. 29 1584
[5] Chen L F, Zhao D M 2006 Opt. Express 14 8552
[6] Wang X G, Zhao D M, Jing F, Wei X F 2006 Opt. Express 14 1476
[7] Meng X F, Cai L Z, Xu X F, Yang X L, Shen X X, Dong G Y, Wang Y W 2006 Opt. Lett. 31 1414
[8] Fan D S, Meng X F, Yang X L, Wang Y R, Peng X, He W Q 2012 Acta. Phys. Sin. 61 244204 (in Chinese) [范德胜, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇 2012 61 244204]
[9] Liu Z J, Guo Q, Xu L, Ahmad M A, Liu S T 2010 Opt. Express 18 12033
[10] Zhou N R, Wang Y X, Gong L H 2011 Opt. Commun. 284 3234
[11] Zhang Y, Wang B 2008 Opt. Lett. 33 2443
[12] Chen W, Chen X 2013 Opt. Commun. 286 123
[13] He W Q, Peng X, Meng X F, Liu X L 2013 Acta. Phys. Sin. 62 064205 (in Chinese) [何文奇, 彭翔, 孟祥锋, 刘晓利 2013 62 064205]
[14] Wang R K, Watson I A, Chatwin C 1996 Opt. Eng. 35 2464
[15] Li Y Z, Kreske K, Rosen J 2000 Appl. Opt. 39 5295
[16] Situ G, Zhang J 2005 Opt. Commun. 245 55
[17] Situ G, Zhang J 2003 Optik 114 473
[18] Meng X F, Cai L Z, Yang X L, Shen X X, Dong G Y 2006 Appl. Opt. 45 3289
[19] Meng X F, Cai L Z, Wang Y R, Yang X L, Xu X F, Dong G Y, Shen X X, Zhang H, Cheng X C 2007 J. Opt. A:Pure Appl. Opt. 9 1070
[20] Huang J J, Hwang H E, Chen C Y, Chen C M 2012 Appl. Opt. 51 2388
[21] Xu N, Chen X L, Yang G 2013 Acta. Phys. Sin. 62 084202 (in Chinese) [徐宁, 陈雪莲, 杨庚 2013 62 084202]
[22] Chen W, Chen X D 2014 Opt. Commun. 318 128
[23] Gong Q, Liu X Y, Li G Q, Qin Y 2013 Appl. Opt. 52 7486
[24] Wang Q, Guo Q, Lei L 2014 Opt. Commun. 320 12
[25] Wang Y, Quan C, Tay C J 2014 Opt. Commun. 330 91
[26] Diffie W, Hellman M E 1976 IEEE T. Inform. Theory IT-22 644
[27] Bruce S 1996 Applied Cryptography Second Edition:Protocols, Algorithms, and Scource Code in C (New York:John Wiley & Sons) pp 461-482
[28] Rivest R, Shamir A, Adleman L 1978 Comm. ACM 21 120
[29] Meng X F, Peng X, Cai L Z, Li A M, Gao Z, Wang Y R 2009 J. Opt. A:Pure Appl. Opt. 11 085402
[30] Spagnolo G S, Simonetti C, Cozzella L 2005 J. Opt. A:Pure Appl. Opt. 7 333
[31] Chen W, Chen X D, Stern A, Javidi B 2013 IEEE Photon. J. 5 6900113
-
[1] Refrégier P, Javidi B 1995 Opt. Lett. 20 767
[2] Liu S T, Mi Q L, Zhu B H 2001 Opt. Lett. 26 1242
[3] Tao R, Xin Y, Wang Y 2003 Opt. Express 15 16067
[4] Situ G, Zhang J 2003 Opt. Lett. 29 1584
[5] Chen L F, Zhao D M 2006 Opt. Express 14 8552
[6] Wang X G, Zhao D M, Jing F, Wei X F 2006 Opt. Express 14 1476
[7] Meng X F, Cai L Z, Xu X F, Yang X L, Shen X X, Dong G Y, Wang Y W 2006 Opt. Lett. 31 1414
[8] Fan D S, Meng X F, Yang X L, Wang Y R, Peng X, He W Q 2012 Acta. Phys. Sin. 61 244204 (in Chinese) [范德胜, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇 2012 61 244204]
[9] Liu Z J, Guo Q, Xu L, Ahmad M A, Liu S T 2010 Opt. Express 18 12033
[10] Zhou N R, Wang Y X, Gong L H 2011 Opt. Commun. 284 3234
[11] Zhang Y, Wang B 2008 Opt. Lett. 33 2443
[12] Chen W, Chen X 2013 Opt. Commun. 286 123
[13] He W Q, Peng X, Meng X F, Liu X L 2013 Acta. Phys. Sin. 62 064205 (in Chinese) [何文奇, 彭翔, 孟祥锋, 刘晓利 2013 62 064205]
[14] Wang R K, Watson I A, Chatwin C 1996 Opt. Eng. 35 2464
[15] Li Y Z, Kreske K, Rosen J 2000 Appl. Opt. 39 5295
[16] Situ G, Zhang J 2005 Opt. Commun. 245 55
[17] Situ G, Zhang J 2003 Optik 114 473
[18] Meng X F, Cai L Z, Yang X L, Shen X X, Dong G Y 2006 Appl. Opt. 45 3289
[19] Meng X F, Cai L Z, Wang Y R, Yang X L, Xu X F, Dong G Y, Shen X X, Zhang H, Cheng X C 2007 J. Opt. A:Pure Appl. Opt. 9 1070
[20] Huang J J, Hwang H E, Chen C Y, Chen C M 2012 Appl. Opt. 51 2388
[21] Xu N, Chen X L, Yang G 2013 Acta. Phys. Sin. 62 084202 (in Chinese) [徐宁, 陈雪莲, 杨庚 2013 62 084202]
[22] Chen W, Chen X D 2014 Opt. Commun. 318 128
[23] Gong Q, Liu X Y, Li G Q, Qin Y 2013 Appl. Opt. 52 7486
[24] Wang Q, Guo Q, Lei L 2014 Opt. Commun. 320 12
[25] Wang Y, Quan C, Tay C J 2014 Opt. Commun. 330 91
[26] Diffie W, Hellman M E 1976 IEEE T. Inform. Theory IT-22 644
[27] Bruce S 1996 Applied Cryptography Second Edition:Protocols, Algorithms, and Scource Code in C (New York:John Wiley & Sons) pp 461-482
[28] Rivest R, Shamir A, Adleman L 1978 Comm. ACM 21 120
[29] Meng X F, Peng X, Cai L Z, Li A M, Gao Z, Wang Y R 2009 J. Opt. A:Pure Appl. Opt. 11 085402
[30] Spagnolo G S, Simonetti C, Cozzella L 2005 J. Opt. A:Pure Appl. Opt. 7 333
[31] Chen W, Chen X D, Stern A, Javidi B 2013 IEEE Photon. J. 5 6900113
Catalog
Metrics
- Abstract views: 6780
- PDF Downloads: 692
- Cited By: 0