가상위상영상을 이용한 잡음 및 변이에 강한 암호화 시스템

Shift and Noise Tolerance Encryption System using a Phase-Based Virtual Image

  • 서동환 (경북대학교 전자전기컴퓨터학부) ;
  • 김수중 (경북대학교 전자전기컴퓨터학부)
  • 발행 : 2003.09.01

초록

본 논문에서는 위상 변조된 가상 영상을 이용하여 암호화 수준을 향상시키고 퓨리에 영역에서 잡음이나 변이에 강한 복호화 방법을 제안하였다. 암호화된 영상은 원 영상이 아닌 위상 변조된 가상 영상과 무작위 위상 영상을 곱하여 퓨리에 변환하여 만든다. 따라서 허가되지 않은 사용자가 암호화된 영상을 분석함으로써 있을 수 있는 복제 가능성을 원 영상의 어떤 정보도 포함하지 않은 가상 영상을 사용함으로써 배제할 수 있다. 복호화 과정은 암호화된 영상과 제안한 위상 대응 규칙으로 만들어진 퓨리에 복호화 키를 간섭시킨 후 퓨리에 역변환하여 간단히 원 영상을 재생하고 컴퓨터 모의 실험을 통하여 제안한 방법의 암호화된 영상과 복호화 키 영상에 잡음이나 영상의 절단, 변이가 발생하더라도 원 영상의 복원이 가능함을 확인하였다.

In this paper, we propose an improved image encryption and the shift-tolerance method in the Fourier space using a virtual phase image. The encrypted image is obtained by the Fourier transform of the product of a phase-encoded virtual image, not an original image, and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, we can prevent the possibility of counterfeiting from unauthorized people using virtual image which dose not contain any information from the original image. The decryption technique is simply performed by inverse Fourier transform of the interference pattern between the encrypted image and the Fourier decrypting key, made of proposed phase assignment rule, in frequency domain. We demonstrate the robustness to noise, to data loss and shift of the encrypted image or the Fourier decryption key in the proposed technique.

키워드

참고문헌

  1. B. Javidi and J. L. Homer, 'Optical pattern recognition for validation and security verification,' Opt. Eng. vol. 33, pp. 1752-1756, 1994 https://doi.org/10.1117/12.170736
  2. R. K. Wang, I. A. Watson, and C. Chatwin, 'Random phase encoding for optical security,' Opt. Eng., vol. 35, pp. 2464-2469, 1996 https://doi.org/10.1117/1.600849
  3. P. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Opt. Lett., vol. 20, pp. 767-769, 1995 https://doi.org/10.1364/OL.20.000767
  4. B. Javidi, G. Zhang, and Jian Li, 'Experimental demonstration of the random phase encoding technique for image encryption and security verification', Opt. Eng., vol. 35, pp. 2506-2512, 1996 https://doi.org/10.1117/1.600854
  5. B. Javidi and E. Ahouzi, 'Optical security system with Fourier plane encodling', Appl. Opt., vol. 37, pp. 6247-6255, 1998 https://doi.org/10.1364/AO.37.006247
  6. T. Nomura and B. Javidi, 'Optical encryption using a joint transtorm correlator architecture', Opt. Eng., vol. 39, pp. 2031-2035, 2000 https://doi.org/10.1117/1.1304844
  7. T. Nomura and B. Javidi, 'Optical encryption system with a binary key code', Appl. Opt., vol. 39, pp. 4783-4787, 2000 https://doi.org/10.1364/AO.39.004783
  8. M. Yamazaki, J. Ohtsubo, 'Optimization of encrypted holograms in optical security systems', Opt. Eng., vol. 40, pp. 132-137, 2001 https://doi.org/10.1117/1.1334947
  9. G. Unnikrishnan, J. Joseph, and K. Singh, 'Optical encryption system that uses phase conjugation in a photorefractive crystal', Appl. Opt., vol. 37, pp. 8181-8186, 1998 https://doi.org/10.1364/AO.37.008181
  10. B. Javidi, A. Sergent, G. Zhang, and L. Guibert, 'Fault tolerance properties of a double phase encoding encryption technique,' Opt. Eng. vol. 36, pp. 992-998, 1997 https://doi.org/10.1117/1.601144
  11. B. Javidi, A. Sergent, and E. Ahouzi, 'Performance of double phase encoding encryption technique using binarized encrypted images,' Opt. Eng., vol. 37, pp. 565-570, 1998 https://doi.org/10.1117/1.601645
  12. B. Wang, C. C. Sun, W. C. Su, and A. E. T. Chiou, 'Shift-tolerance property of an optical double-random phase-encoding encryption system,' Appl. Opt., vol. 39, pp. 4788-4793, 2000 https://doi.org/10.1364/AO.39.004788
  13. N. Towghi, B. Javidi, and Z. Luo, 'Fully phase encrypted image processor,' J. Opt. Soc. Am. A, vol. 16, pp. 1915-1927, 1999 https://doi.org/10.1364/JOSAA.16.001915
  14. X. Tan, O. Matoba, T. Shinura, K. Kuroda, and B. Javidi, 'Secure optical storage that uses fully phase encryption,' Appl. Opt., vol. 39, pp. 6689-6694, 2000 https://doi.org/10.1364/AO.39.006689
  15. P. C. Mogensen and J. Gluckstad, 'Phase-only optical encryption,' Opt. Lett., vol. 25, pp. 566-568, 2000 https://doi.org/10.1364/OL.25.000566
  16. P. C. Mogensen and J. Gluckstad, 'Phase-only optical decryption of a fixed mask,' Appl. Opt., vol. 40, pp. 1226-1235, 2001 https://doi.org/10.1364/AO.40.001226
  17. J. Ohtsubo and A. Fujimoto, 'Practical image encryption and decrtption by phase-coding technique for optical security systms,' Appl. Opt., vol. 41, pp. 4848-4855, 2002 https://doi.org/10.1364/AO.41.004848
  18. H. T. Chang, 'Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information,' Opt. Eng., vol. 40, pp. 2165-2171, 2001 https://doi.org/10.1117/1.1402124
  19. L. G. Neto, D. Roberge, and Y. Sheng, 'Full-range, continuous, complex modulation by the use of two coupled-mode liquid-crystal televisions,' Appl. Opt., vol. 35, pp. 4567-4576, 1996 https://doi.org/10.1364/AO.35.004567
  20. C. Iemmi, S. Ledesma, J. Campos, and M. Villarreal, 'Gray-level computer-gencrated hologram filters for multiple-object correlation,' Appl. Opt., vol. 39, pp. 1233-1240, 2000 https://doi.org/10.1364/AO.39.001233