Shift and Noise Tolerance Encryption System Using a Joint Transform Correlator

결합 변환 상관기를 이용한 잡음 및 변이에 강한 암호화 시스템

  • 서동환 (경북대학교 전자전기컴퓨터학부) ;
  • 김수중 (경북대학교 전자전기컴퓨터학부)
  • Published : 2003.07.01

Abstract

In this paper, we propose the shift and noise tolerance method using a virtual phase image and a joint transform correlator (JTC) architecture that can alleviate the need for an accurate optical axis alignment. An encrypted image is obtained by the Fourier transform of the product of a phase- encoded virtual image to camouflage the original one and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, we can prevent the possibility of counterfeiting from unauthorized people using virtual image which dose not contain any information from the original image. We demonstrate the robustness to noise, to data loss and to shift of the encrypted image using a JTC in the proposed description technique.

본 논문에서는 가상 위상 영상과 정확한 광축 정렬이 필요 없는 결합 변환 상관기를 이용하여 잡음이나 변이에 강한 복호화 방법을 제안하였다. 암호화된 영상은 원 영상을 속이기 위한 위상 변조된 가상 영상과 무작위 위상 영상을 곱하여 퓨리에 변환하여 만든다. 따라서 허가되지 않은 사용자가 암호화된 영상을 분석함으로써 있을 수 있는 복제 가능성을 원 영상의 어떤 정보도 포함하지 않은 가상 영상을 사용함으로써 배제할 수 있다 결합 변환 상관기를 이용한 제안한 복호화 방법이 암호화된 영상에 잡음이나 절단, 변이에 대해서 강한 특성을 가짐을 확인하였다.

Keywords

References

  1. B. Javidi and J. L. Homer, 'Optical pattern recognition for validatio and security verification,' Opt. Eng., vol. 33, pp. 1752-1756, 1994 https://doi.org/10.1117/12.170736
  2. R. K. Wang, I. A. Watson, and C. Chatwin, 'Random phase enceoding for optical security,' Opt. Eng., vol. 35, pp. 2464-2469, 1996 https://doi.org/10.1117/1.600849
  3. P. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Opt. Lett., vol. 20, pp. 767-769, 1995 https://doi.org/10.1364/OL.20.000767
  4. B. Javidi, G. Zhang, and Jian Li, 'Experimental demonstration of the random phase encoding technique for image encryption and security verification,' Opt. Eng., vol. 35, pp. 2506-2512, 1996 https://doi.org/10.1117/1.600854
  5. B. Javidi and E. Ahouzi, 'Optical security system with Fourier plane encoding,' Appl. Opt., vol. 37, pp. 6247-6255, 1998 https://doi.org/10.1364/AO.37.006247
  6. B. Javidi, A. Sergent, G. Zhang, and L. Guibert, 'Fault tolerance properties of a double phase encoding encryption technique,' Opt. Eng. vol. 36, pp. 992-998, 1997 https://doi.org/10.1117/1.601144
  7. B. Javidi, A. Sergent, and E. Ahouzi, 'Performance of double phase encoding encryption technique using binarized encrypted images,' Opt. Eng., vol. 37, pp. 565-570, 1998 https://doi.org/10.1117/1.601645
  8. B. Wang, C. C. Sun, W. C. Su, and A. E. T. Chiou, 'Shift-tolerance property of an optical double-random phase-encoding encryption system,' Appl. Opt., vol. 39, pp. 4788-4793, 2000 https://doi.org/10.1364/AO.39.004788
  9. N. Towghi, B. Javidi, and Z. Luo, 'Fully phase encrypted image processor,' J. Opt. Soc. Am. A, vol. 16, pp. 1915-1927, 1999 https://doi.org/10.1364/JOSAA.16.001915
  10. X.Tan, O. Matoba, T. Shinura, K. Kuroda, and B. Javidi, 'Secure optical storage that uses fully phase encryption,' Appl. Opt., vol. 39, pp. 6689-6694, 2000 https://doi.org/10.1364/AO.39.006689
  11. P. C. Mogensen and J. Gluckstad, 'Phase-only optical encryption,' Opt. Lett., vol. 25, pp. 566-568, 2000 https://doi.org/10.1364/OL.25.000566
  12. P. C. Mogensen and J. Gluckstad, 'Phase-only optical decryption of a fixed mask,' Appl. Opt., vol. 40, pp. 1226-1235, 2001 https://doi.org/10.1364/AO.40.001226
  13. J. Ohtsubo and A. Fujimoto, 'Practical image encryption and decryption by phase-coding technique for optical security systems,' Appl. Opt. vol. 41, pp. 4848-4855, 2002 https://doi.org/10.1364/AO.41.004848
  14. T. Nomura and B. Javidi, 'Optical encryption using a joint transform correlator architecture,' Opt. Eng., vol. 39, pp. 2031-2035, 2000. https://doi.org/10.1117/1.1304844
  15. T. Nomura and B. Javidi, 'Optical encryption system with a binary key code,' Appl.Opt., vol. 39, pp. 4783-4787, 2000 https://doi.org/10.1364/AO.39.004783
  16. M. Yamazaki and J. Ohtsubo, 'Optimization of encrypted holograms in optical security systems,' Opt. Eng., vol. 40, pp. 132-137, 2001 https://doi.org/10.1117/1.1334947
  17. H. T. Chang, 'Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information,' Opt. Eng., vol. 40, pp. 2165-2171, 2001 https://doi.org/10.1117/1.1402124
  18. L. G. Neto, D. Roberge, and Y. Sheng, 'Full-range, continuous, complex modulation by the use of two coupled-mode liquid-crystal televisions,' Appl. Opt., vol. 35, pp. 4567-4576, 1996. https://doi.org/10.1364/AO.35.004567
  19. C. lemmi, S. Ledesma, J. Campos, and M. Villarreal, 'Gray-level computer-generated hologram filters for multiple-object correlation,' Appl. Opt., vol. 39, pp. 1233-1240, 2000 https://doi.org/10.1364/AO.39.001233