Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Asymetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm

Pan Xue-Mei Meng Xiang-Feng Yang Xiu-Lun Wang Yu-Rong Peng Xiang He Wen-Qi Dong Guo-Yan Chen Hong-Yi

Citation:

Asymetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm

Pan Xue-Mei, Meng Xiang-Feng, Yang Xiu-Lun, Wang Yu-Rong, Peng Xiang, He Wen-Qi, Dong Guo-Yan, Chen Hong-Yi
PDF
Get Citation

(PLEASE TRANSLATE TO ENGLISH

BY GOOGLE TRANSLATE IF NEEDED.)

  • By combining the iterative phase retrieval algorithm in the Fresnel domain with the shift rotation permutation operations of row vectors and column vectors, a new kind of asymmetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm is proposed, where multiple complex amplitude information in the input plane is retrieved and generated by the phase retrieval algorithm in the Fresnel domain. In original binary amplitude mask, the row vector and column vectors random numbers are randomly generated in advance, such that each sampling mask for each authenticator is obtained by the shift rotation permutation operations of corresponding row vector and column vectors random numbers for original binary amplitude mask. Thus, one synthesized complex amplitude is generated by the operations of sampling, overlap and multiplexing, and then sent to the certification center for authentication use. At the same time, the row vector and column vectors random numbers are encoded to ciphers by the public keys of RSA algorithm, and then delivered to the corresponding authenticators. During the authentication process, the row vector and column vectors random numbers are first decoded by the private keys possessed by the authenticator; second, the authenticator’s sampling mask is reconstructed by the shift rotation permutation operations of the above decoded random numbers for original binary amplitude mask. Finally, the authenticator with other additional authentication keys is prompted to place the synthesized complex amplitude information and its sampling mask at the corresponding positions, when the system is illuminated by a plane wave with the correct wavelength. A recovered image is then recorded in the output plane, by calculating and displaying the nonlinear correlation coefficient between the recovered image and the certification image, if there exists a remarkable peak in its nonlinear correlation coefficient distributions, indicating that the authentication is successful. On the contrary, if there is no remarkable peak but uniformly distributed white noise in the map, the authentication process is a failure attempt. Any intruder with randomly generated forged authentication keys will end up with a failure which enhances the security of the system to some extent.
    • Funds: Project supported by the National Natural Science Foundation of China (Grant Nos. 61275014, 61307003, 61171073, 51102148, 1110488), the Natural Science Foundation of Shandong province, China (Grant No. ZR2011FQ011), the Natural Science and Technology programs of Shandong province, China (Grant No. 2011GGH20119), and the Research Award Fund for Outstanding Young Scientists of Shandong Province, China (Grant No. BS2011DX023).
    [1]

    Refrégier P, Javidi B 1995 Opt. Lett. 20 767

    [2]

    Liu S T, Mi Q L, Zhu B H 2001 Opt. Lett. 26 1242

    [3]

    Tao R, Xin Y, Wang Y 2003 Opt. Express 15 16067

    [4]

    Situ G, Zhang J 2003 Opt. Lett. 29 1584

    [5]

    Chen L F, Zhao D M 2006 Opt. Express 14 8552

    [6]

    Wang X G, Zhao D M, Jing F, Wei X F 2006 Opt. Express 14 1476

    [7]

    Meng X F, Cai L Z, Xu X F, Yang X L, Shen X X, Dong G Y, Wang Y W 2006 Opt. Lett. 31 1414

    [8]

    Fan D S, Meng X F, Yang X L, Wang Y R, Peng X, He W Q 2012 Acta. Phys. Sin. 61 244204 (in Chinese) [范德胜, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇 2012 61 244204]

    [9]

    Liu Z J, Guo Q, Xu L, Ahmad M A, Liu S T 2010 Opt. Express 18 12033

    [10]

    Zhou N R, Wang Y X, Gong L H 2011 Opt. Commun. 284 3234

    [11]

    Zhang Y, Wang B 2008 Opt. Lett. 33 2443

    [12]

    Chen W, Chen X 2013 Opt. Commun. 286 123

    [13]

    He W Q, Peng X, Meng X F, Liu X L 2013 Acta. Phys. Sin. 62 064205 (in Chinese) [何文奇, 彭翔, 孟祥锋, 刘晓利 2013 62 064205]

    [14]

    Wang R K, Watson I A, Chatwin C 1996 Opt. Eng. 35 2464

    [15]

    Li Y Z, Kreske K, Rosen J 2000 Appl. Opt. 39 5295

    [16]

    Situ G, Zhang J 2005 Opt. Commun. 245 55

    [17]

    Situ G, Zhang J 2003 Optik 114 473

    [18]

    Meng X F, Cai L Z, Yang X L, Shen X X, Dong G Y 2006 Appl. Opt. 45 3289

    [19]

    Meng X F, Cai L Z, Wang Y R, Yang X L, Xu X F, Dong G Y, Shen X X, Zhang H, Cheng X C 2007 J. Opt. A:Pure Appl. Opt. 9 1070

    [20]

    Huang J J, Hwang H E, Chen C Y, Chen C M 2012 Appl. Opt. 51 2388

    [21]

    Xu N, Chen X L, Yang G 2013 Acta. Phys. Sin. 62 084202 (in Chinese) [徐宁, 陈雪莲, 杨庚 2013 62 084202]

    [22]

    Chen W, Chen X D 2014 Opt. Commun. 318 128

    [23]

    Gong Q, Liu X Y, Li G Q, Qin Y 2013 Appl. Opt. 52 7486

    [24]

    Wang Q, Guo Q, Lei L 2014 Opt. Commun. 320 12

    [25]

    Wang Y, Quan C, Tay C J 2014 Opt. Commun. 330 91

    [26]

    Diffie W, Hellman M E 1976 IEEE T. Inform. Theory IT-22 644

    [27]

    Bruce S 1996 Applied Cryptography Second Edition:Protocols, Algorithms, and Scource Code in C (New York:John Wiley & Sons) pp 461-482

    [28]

    Rivest R, Shamir A, Adleman L 1978 Comm. ACM 21 120

    [29]

    Meng X F, Peng X, Cai L Z, Li A M, Gao Z, Wang Y R 2009 J. Opt. A:Pure Appl. Opt. 11 085402

    [30]

    Spagnolo G S, Simonetti C, Cozzella L 2005 J. Opt. A:Pure Appl. Opt. 7 333

    [31]

    Chen W, Chen X D, Stern A, Javidi B 2013 IEEE Photon. J. 5 6900113

  • [1]

    Refrégier P, Javidi B 1995 Opt. Lett. 20 767

    [2]

    Liu S T, Mi Q L, Zhu B H 2001 Opt. Lett. 26 1242

    [3]

    Tao R, Xin Y, Wang Y 2003 Opt. Express 15 16067

    [4]

    Situ G, Zhang J 2003 Opt. Lett. 29 1584

    [5]

    Chen L F, Zhao D M 2006 Opt. Express 14 8552

    [6]

    Wang X G, Zhao D M, Jing F, Wei X F 2006 Opt. Express 14 1476

    [7]

    Meng X F, Cai L Z, Xu X F, Yang X L, Shen X X, Dong G Y, Wang Y W 2006 Opt. Lett. 31 1414

    [8]

    Fan D S, Meng X F, Yang X L, Wang Y R, Peng X, He W Q 2012 Acta. Phys. Sin. 61 244204 (in Chinese) [范德胜, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇 2012 61 244204]

    [9]

    Liu Z J, Guo Q, Xu L, Ahmad M A, Liu S T 2010 Opt. Express 18 12033

    [10]

    Zhou N R, Wang Y X, Gong L H 2011 Opt. Commun. 284 3234

    [11]

    Zhang Y, Wang B 2008 Opt. Lett. 33 2443

    [12]

    Chen W, Chen X 2013 Opt. Commun. 286 123

    [13]

    He W Q, Peng X, Meng X F, Liu X L 2013 Acta. Phys. Sin. 62 064205 (in Chinese) [何文奇, 彭翔, 孟祥锋, 刘晓利 2013 62 064205]

    [14]

    Wang R K, Watson I A, Chatwin C 1996 Opt. Eng. 35 2464

    [15]

    Li Y Z, Kreske K, Rosen J 2000 Appl. Opt. 39 5295

    [16]

    Situ G, Zhang J 2005 Opt. Commun. 245 55

    [17]

    Situ G, Zhang J 2003 Optik 114 473

    [18]

    Meng X F, Cai L Z, Yang X L, Shen X X, Dong G Y 2006 Appl. Opt. 45 3289

    [19]

    Meng X F, Cai L Z, Wang Y R, Yang X L, Xu X F, Dong G Y, Shen X X, Zhang H, Cheng X C 2007 J. Opt. A:Pure Appl. Opt. 9 1070

    [20]

    Huang J J, Hwang H E, Chen C Y, Chen C M 2012 Appl. Opt. 51 2388

    [21]

    Xu N, Chen X L, Yang G 2013 Acta. Phys. Sin. 62 084202 (in Chinese) [徐宁, 陈雪莲, 杨庚 2013 62 084202]

    [22]

    Chen W, Chen X D 2014 Opt. Commun. 318 128

    [23]

    Gong Q, Liu X Y, Li G Q, Qin Y 2013 Appl. Opt. 52 7486

    [24]

    Wang Q, Guo Q, Lei L 2014 Opt. Commun. 320 12

    [25]

    Wang Y, Quan C, Tay C J 2014 Opt. Commun. 330 91

    [26]

    Diffie W, Hellman M E 1976 IEEE T. Inform. Theory IT-22 644

    [27]

    Bruce S 1996 Applied Cryptography Second Edition:Protocols, Algorithms, and Scource Code in C (New York:John Wiley & Sons) pp 461-482

    [28]

    Rivest R, Shamir A, Adleman L 1978 Comm. ACM 21 120

    [29]

    Meng X F, Peng X, Cai L Z, Li A M, Gao Z, Wang Y R 2009 J. Opt. A:Pure Appl. Opt. 11 085402

    [30]

    Spagnolo G S, Simonetti C, Cozzella L 2005 J. Opt. A:Pure Appl. Opt. 7 333

    [31]

    Chen W, Chen X D, Stern A, Javidi B 2013 IEEE Photon. J. 5 6900113

  • [1] Wang Zi-Shuo, Liu Lei, Liu Chen-Bo, Liu Ke, Zhong Zhi, Shan Ming-Guang. Fast phase unwrapping using digital differentiation-integration method. Acta Physica Sinica, 2023, 72(18): 184201. doi: 10.7498/aps.72.20230473
    [2] Shan Ming-Guang, Liu Xiang-Yu, Pang Cheng, Zhong Zhi, Yu Lei, Liu Bin, Liu Lei. Off-axis digital holographic decarrier phase recovery algorithm combined with linear regression. Acta Physica Sinica, 2022, 71(4): 044202. doi: 10.7498/aps.71.20211509
    [3] Wu Di, Jiang Zi-Zhen, Yu Huan-Huan, Zhang Chen-Shuang, Zhang Jiao, Lin Dan-Ying, Yu Bin, Qu Jun-Le. Quantitative phase microscopy imaging based on fractional spiral phase plate. Acta Physica Sinica, 2021, 70(15): 158702. doi: 10.7498/aps.70.20201884
    [4] Zhou Jing, Zhang Xiao-Fang, Zhao Yan-Geng. Phase retrieval wavefront sensing based on image fusion and convolutional neural network. Acta Physica Sinica, 2021, 70(5): 054201. doi: 10.7498/aps.70.20201362
    [5] Precise phase retrieval with carrier removal from single off-axis hologram by linear regression. Acta Physica Sinica, 2021, (): . doi: 10.7498/aps.70.20211509
    [6] Ge Yin-Juan, Pan Xing-Chen, Liu Cheng, Zhu Jian-Qiang. Technique of detecting optical components based on coherent modulation imaging. Acta Physica Sinica, 2020, 69(17): 174202. doi: 10.7498/aps.69.20200224
    [7] Sun Teng-Fei, Lu Peng, Zhuo Zhuang, Zhang Wen-Hao, Lu Jing-Qi. Dual-channel quantitative phase microscopy based on a single cube beamsplitter interferometer. Acta Physica Sinica, 2018, 67(14): 140704. doi: 10.7498/aps.67.20172722
    [8] Qi Jun-Cheng, Chen Rong-Chang, Liu Bin, Chen Ping, Du Guo-Hao, Xiao Ti-Qiao. Grating based X-ray phase contrast CT imaging with iterative reconstruction algorithm. Acta Physica Sinica, 2017, 66(5): 054202. doi: 10.7498/aps.66.054202
    [9] He Jiang-Tao, He Wen-Qi, Liao Mei-Hua, Lu Da-Jiang, Peng Xiang. Identity authentication based on two-beam interference and nonlinear correlation. Acta Physica Sinica, 2017, 66(4): 044202. doi: 10.7498/aps.66.044202
    [10] Wang Da-Yong, Wang Yun-Xin, Guo Sha, Rong Lu, Zhang Yi-Zhuo. Research on speckle denoising by lensless Fourier transform holographic imaging with angular diversity. Acta Physica Sinica, 2014, 63(15): 154205. doi: 10.7498/aps.63.154205
    [11] Lai Zhi, Guo Liang, Li Xiao-Zhen, Dang Wen-Jia. Application of machine vision to the measurement of the effective d31 coefficient in laser interferometry. Acta Physica Sinica, 2013, 62(18): 184207. doi: 10.7498/aps.62.184207
    [12] Liu Hong-Zhan, Ji Yue-Feng. An ameliorated fast phase retrieval iterative algorithm based on the angular spectrum theory. Acta Physica Sinica, 2013, 62(11): 114203. doi: 10.7498/aps.62.114203
    [13] He Wen-Qi, Peng Xiang, Meng Xiang-Feng, Liu Xiao-Li. Multi-level authentication based on two-beam interference. Acta Physica Sinica, 2013, 62(6): 064205. doi: 10.7498/aps.62.064205
    [14] Yang Zhen-Ya, Zheng Chu-Jun. Phase retrieval of pure phase object based on compressed sensing. Acta Physica Sinica, 2013, 62(10): 104203. doi: 10.7498/aps.62.104203
    [15] Fan De-Sheng, Meng Xiang-Feng, Yang Xiu-Lun, Wang Yu-Rong, Peng Xiang, He Wen-Qi. Software realization of optical information hiding system based on phase-shifting interferometry. Acta Physica Sinica, 2012, 61(24): 244204. doi: 10.7498/aps.61.244204
    [16] Ji Chao, Zhang Ling-Yun, Dou Shuo-Xing, Wang Peng-Ye. A new method to deal with biomacromolecularimage observed by atomic force microscopy. Acta Physica Sinica, 2011, 60(9): 098703. doi: 10.7498/aps.60.098703
    [17] He Wen-Qi, Qin Wan, Peng Xiang, Guo Ji-Ping, Li A-Meng, Cai Lü-Zhong, Meng Xiang-Feng. Optimized two-step phase-shifting algorithm applied to image encryption. Acta Physica Sinica, 2010, 59(9): 6118-6124. doi: 10.7498/aps.59.6118
    [18] Meng Xiang-Feng, Cai Lü-Zhong, Wang Yu-Rong, Peng Xiang. Optical experimental verification of two-step generalized phase-shifting interferometry. Acta Physica Sinica, 2009, 58(3): 1668-1674. doi: 10.7498/aps.58.1668
    [19] Huang Yan-Ping, Qi Chun-Yuan. Measurement of refractive index profile of holey fiber using quantitative phase tomography. Acta Physica Sinica, 2006, 55(12): 6395-6398. doi: 10.7498/aps.55.6395
    [20] Yu Bin, Peng Xiang, Tian Jin-Dong, Niu Han-Ben. Phase retrieval for hard x-ray in-line phase contrast imaging. Acta Physica Sinica, 2005, 54(5): 2034-2037. doi: 10.7498/aps.54.2034
Metrics
  • Abstract views:  6780
  • PDF Downloads:  692
  • Cited By: 0
Publishing process
  • Received Date:  21 August 2014
  • Accepted Date:  29 December 2014
  • Published Online:  05 June 2015

/

返回文章
返回
Baidu
map