DOI QR코드

DOI QR Code

Optical Encryption Scheme for Cipher Feedback Block Mode Using Two-step Phase-shifting Interferometry

  • Jeon, Seok Hee (Department of Electronic Engineering, Incheon National University) ;
  • Gil, Sang Keun (Department of Electronic Engineering, The University of Suwon)
  • Received : 2020.12.31
  • Accepted : 2021.03.06
  • Published : 2021.04.25

Abstract

We propose a novel optical encryption scheme for cipher-feedback-block (CFB) mode, capable of encrypting two-dimensional (2D) page data with the use of two-step phase-shifting digital interferometry utilizing orthogonal polarization, in which the CFB algorithm is modified into an optical method to enhance security. The encryption is performed in the Fourier domain to record interferograms on charge-coupled devices (CCD)s with 256 quantized gray levels. A page of plaintext is encrypted into digital interferograms of ciphertexts, which are transmitted over a digital information network and then can be decrypted by digital computation according to the given CFB algorithm. The encryption key used in the decryption procedure and the plaintext are reconstructed by dual phase-shifting interferometry, providing high security in the cryptosystem. Also, each plaintext is sequentially encrypted using different encryption keys. The random-phase mask attached to the plaintext provides resistance against possible attacks. The feasibility and reliability of the proposed CFB method are verified and analyzed with numerical simulations.

Keywords

References

  1. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  2. O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128-1148 (2009). https://doi.org/10.1109/JPROC.2009.2018367
  3. A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589-636 (2009). https://doi.org/10.1364/AOP.1.000589
  4. W. Chen, B. Javidi, and X. Chen, "Advances in optical security systems," Adv. Opt. Photonics 6, 120-155 (2014). https://doi.org/10.1364/AOP.6.000120
  5. B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, "Roadmap on optical security," J. Opt. 18, 083001 (2016). https://doi.org/10.1088/2040-8978/18/8/083001
  6. B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
  7. E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt. 39, 2313-2320 (2000). https://doi.org/10.1364/AO.39.002313
  8. L.-Z Cai, M.-Z He, Q. Liu, and X.-L Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004). https://doi.org/10.1364/AO.43.003078
  9. C. Mela and C. Iemmi, "Optical encryption using phase-shifting interferometry in a joint transform correlator," Opt. Lett. 31, 2562-2564 (2006). https://doi.org/10.1364/OL.31.002562
  10. X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
  11. H. Li, "Image encryption based on gyrator transform and two-step phase-shifting interferometry," Opt. Lasers Eng. 47, 45-50 (2009). https://doi.org/10.1016/j.optlaseng.2008.08.001
  12. X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, "Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm," J. Opt. A: Pure Appl. Opt. 11, 085402 (2009). https://doi.org/10.1088/1464-4258/11/8/085402
  13. S.-H. Jeon and S.-K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011). https://doi.org/10.3807/JOSK.2011.15.3.244
  14. D. Fan, X. Meng, Y. Wang, X. Yang, X. Peng, W. He, G. Dong, and H. Chen, "Asymmetric cryptosystem and software design based on two-step phase-shifting interferometry and elliptic curve algorithm," Opt. Commun. 309, 50-56 (2013). https://doi.org/10.1016/j.optcom.2013.06.044
  15. B. Javidi and T. Nomura, "Polarization encoding for optical security systems," Opt. Eng. 39, 2439-2443 (2000). https://doi.org/10.1117/1.1288369
  16. J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, "Multiplexing encrypted data by using polarized light," Opt. Commun. 260, 109-112 (2006). https://doi.org/10.1016/j.optcom.2005.10.053
  17. U. Gopinathan, T. J. Naughton, and J. T. Sheridan, "Polarization encoding and multiplexing of two-dimensional signals: application to image encryption," Appl. Opt. 45, 5693-5700 (2006). https://doi.org/10.1364/AO.45.005693
  18. N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, "Optical image encryption based on interference of polarized light," Opt. Express 17, 13418-13424 (2009). https://doi.org/10.1364/OE.17.013418
  19. A. Alfalou1 and C. Brosseau, "Dual encryption scheme of images using polarized light," Opt. Lett. 35, 2185-2187 (2010). https://doi.org/10.1364/OL.35.002185
  20. S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012). https://doi.org/10.3807/JOSK.2012.16.4.354
  21. T. J. Naughton, B. M. Hennelly, and T. Dowling, "Introducing secure modes of operation for optical encryption," J. Opt. Soc. Am. A 25, 2608-2617 (2008). https://doi.org/10.1364/JOSAA.25.002608
  22. S.-H. Jeon and S.-K. Gil, "Optical implementation of cipher block chaining mode algorithm using phase-shifting digital holography," Opt. Eng. 55, 123112 (2016). https://doi.org/10.1117/1.OE.55.12.123112