• 검색 결과가 없습니다.

Encryption based on CGH decoding and XOR operation

N/A
N/A
Protected

Academic year: 2022

Share "Encryption based on CGH decoding and XOR operation"

Copied!
2
0
0

로드 중.... (전체 텍스트 보기)

전체 글

(1)

Encryption based on CGH decoding and XOR operation

Tien Viet Vu a, Nguyen Noi Bai a, Nam Kim a, Seok-Hee Jeon b, and Sangkeun Gil c

aDepartment of Information and Communication Engineering, Chungbuk National University

bDepartment of Electronic Engineering, Incheon University

cDepartment of Electronic Engineering, Suwon University

There has been considerable effort to develop optical encryption schemes: Javidi and co- workers [1] have been responsible for proposing the use of phase masks to scramble and encrypt amplitude information. More recently, this system architecture was modified by the replacement of the amplitude information at the input with phase-encoded information.[2]

The problem with these systems is that they use information encoded in both amplitude and phase regimes, hence often requiring the fabrication of complex optical masks. Mogensen and Gluckstad [3] proposed an alternative approach based on the direct mapping of an encrypted phase mask and a decrypting phase key, resulting in the decryption of information completely within a phase-only domain. However, their system uses a phase-contrast filter with an 4-f setup to convert decrypted phase information into amplitude image which can be captured by intensity-sensitive devices. In this paper we propose an alternative decryption scheme which is simpler and is more easily realized than that of Mogensen et al.

The schematic diagram of the binary phase-only decryption and the phase-contrast visualization proposed by Mogensen et al. is shown in Fig. 1. A plane-polarized wave front illuminates an encrypted mask, which consists of a random array of binary phase-shifting pixels with relative phase shifts of 0 and π. The binary information was electronically scrambled with a random binary pattern, and then this scrambled information was used to generate the encrypted mask. The decrypting key reverses the scrambling operation in the optical domain and results in the decrypted phase-only information. The role of the phase- contrast filter and the imaging 4f setup is to generate an intensity pattern at the output that corresponding to the decrypted phase information encoded in the wave front.

Laser Encrypted

Mask

Decrypting Key

Phase- Constrast

Filter

Output Image

4f Setup

Figure 1. Generic system architecture for the decryption operation and phase-contrast filter.

T2F-III3 The Optical Society of Korea Summer Meeting 2006

113

(2)

In our approach, the encrypted mask was produced as follows. First we generate a CGH of the input image needed to be encrypted. The CGH has uniform amplitude and phase elements with relative phase shifts of 0 and π. We use an optimization algorithm such as stimulated annealing to generate a CGH which properly encoded the original image in Fourier domain.

Second, the CGH was electronically scrambled with a random phase-only pattern. Finally, the scrambled information was fabricated to produce the encrypted mask. The result of each step is demonstrated in Fig. 2.

Figure 2. Production of encrypted mask. (a) original amplitude image, (b) CGH, (c) encrypted mask.

Our decryption scheme is shown in Fig. 3. The decrypting key reverses the scrambling operation in the optical domain and results in the decrypted phase-only information. We Fourier transform this information by a Fourier lens to produce the decrypted amplitude image in the back focal plane.

Laser Encrypted

Mask

Decrypting Key

Output Image Fourier Lens

Figure 3. Decryption diagram with Fourier lens.

Acknowledgement

This research was supported by the Ministry of Information & Communications, Korea, under the information Technology Research Center (ITRC) Support Program. and by the Regional Research Centers Program of the Ministry of Education & Human Resources Development in Korea

References

[1] P. Refregier and B. Javidi, “ Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett., vol. 20, pp. 767-769, 1995.

[2] N. Towghi, B. Javidi, and Z. Luo, “ Fully phase encrypted image processor,” JOSA, vol.

16, pp. 1915-1927, 1999.

[3] P. C. Mogensen and J. Gluckstad, “ Phase-only optical encryption,” Opt. Lett., vol. 25, pp. 566-568, 2000.

한국광학회 하계학술발표회

114

참조

관련 문서

• 이명의 치료에 대한 매커니즘과 디지털 음향 기술에 대한 상업적으로의 급속한 발전으로 인해 치료 옵션은 증가했 지만, 선택 가이드 라인은 거의 없음.. •

We proposed first and second order numerical methods based on a new convex splitting of the Swift–Hohenberg energy functional for the phase-field crystal equation..

플록 구조의 측면에서 볼 때 폴리머를 일차 응집제로 사용하면 플록 강도와 크기가 향상되었지만, 다른 처리 옵션과 비교해 볼 때 플록 침전 속도에는 개선이 없었으며 유기 물질

12) Maestu I, Gómez-Aldaraví L, Torregrosa MD, Camps C, Llorca C, Bosch C, Gómez J, Giner V, Oltra A, Albert A. Gemcitabine and low dose carboplatin in the treatment of

첫째, UTAUT모형을 이용하여 스마트폰 어플리케이션의 구매에 대해 검정한 결과 독립변수들 (성과기대, 예상노력, 사회적 영향, 유희적 가치,

Based on the results of an in silico prediction of the protein ’s functional effect based on amino acid alterations and a sequence conservation evaluation of the amino acid

All the patients were diagnosed based on an assay of a-galactosidase A activity in the serum (male patients) and a mutation analysis of the GLA gene (both male and

This might show an advantage in interference time compared with a QP-based algorithm, because the CR change operation frequency channel is dynamically based on