Optical Encryption and Information Authentication of 3D Objects Considering Wireless Channel Characteristics
 Author: Lee InHo, Cho Myungjin
 Organization: Lee InHo; Cho Myungjin
 Publish: Journal of the Optical Society of Korea Volume 17, Issue6, p494~499, 25 Dec 2013

ABSTRACT
In this paper, we present an optical encryption and information authentication of 3D objects considering wireless channel characteristics. Using the optical encryption such as double random phase encryption (DRPE) and 3D integral imaging, a 3D scene with encryption can be transmitted. However, the wireless channel causes the noise and fading effects of the 3D transmitted encryption data. When the 3D encrypted data is transmitted via wireless channel, the information may be lost or distorted because there are a lot of factors such as channel noise, propagation fading, and so on. Thus, using digital modulation and maximum likelihood (ML) detection, the noise and fading effects are mitigated, and the encrypted data is estimated well at the receiver. In addition, using computational volumetric reconstruction of integral imaging and advanced correlation filters, the noise effects may be remedied and 3D information may be authenticated. To prove our method, we carry out an optical experiment for sensing 3D information and simulation for optical encryption with DRPE and authentication with a nonlinear correlation filter. To the best of our knowledge, this is the first report on optical encryption and information authentication of 3D objects considering the wireless channel characteristics.

KEYWORD
3D optical encryption , Computational reconstruction , Wireless channel characteristics

I. INTRODUCTION
In information security technologies, encryption has been widely researched [117]. In particular, optical encryption techniques [516] are helpful to protect the transmitted information. In addition, the speed of the optical encryption is faster than nonoptical encryption methods. Double random phase encryption (DRPE) which is the one of the most widely used has been proposed [5]. However, it has a weak point when the decryption keys are used many times without being updated. To solve this problem, DRPE with photon counting imaging techniques has been reported [13]. It considers a photonlimited version of the encrypted distribution such as a Poisson distribution [1820, 27] in a perfect channel environment. In addition, for 3D objects, threedimensional (3D) photon counting doublerandomphase encryption has been studied recently [26]. In this technique, encrypted data transmission is not considered. It means that a perfect transmission channel is assumed. However, under practical conditions, the transmission channel is not perfect. There are many parameters which cause the noise of the transmitted information.
In particular, the wireless channel causes severe noise and fading effects of the transmitted information. Thus, when the encrypted data is transmitted via a wireless channel, there are a lot of factors such as channel noise, propagation fading, and so on [2123]. To obtain the correct encrypted data at the receiver, it is necessary to digitally modulate the encrypted information at the transmitter and correctly detect the modulated signals at the receiver [2123]. In addition, the nonlinear correlation filters may be used to recognize the primary information [24]. For 3D data encryption, computational volumetric reconstruction of integral imaging [25] may be used. Since this technique uses the superposition of all elemental images at a certain depth, the noise effect caused by the wireless channel may be remedied. Therefore, in this paper, we analyze the effects of a wireless channel for optical encryption data using digital modulation and maximum likelihood (ML) detection. Also, we reconstruct and authenticate 3D information at the receiver using computational volumetric reconstruction of integral imaging and nonlinear correlation filters. To the best of our knowledge, this is the first report on considering the wireless channel characteristics of the 3D optical encryption technique.
The paper is organized as follows. First we briefly present the 3D DRPE in Section II. Then, a wireless channel model is presented, and signal modulation and detection techniques are described in Section III. To show the effects of the wireless channel for optical encryption and the authentication of 3D information, experimental results are implemented in Section IV. Finally, we conclude the paper with a summary and future plans in Section V.
II. 3D OPTICAL ENCRYPTION: DOUBLE RANDOM PHASE ENCRYPTION USING INTEGRAL IMAGING
Optical encryption has many advantages such as parallel processing of optical systems, fast processing time, and data handling in various domains. One of the optical encryption methods, double random phase encryption (DRPE), uses two random phase information. Let us consider the encryption of a onedimensional signal for simplicity. Figure 1 (a) shows the optical schematic setup of DRPE for encryption. Let
s (x ) be the primary data. Then, for encryption, we use two uniformly distributed random noises over [0, 1] which aren_{s} (x ) in the spatial domain andn_{f} (μ ) in the spatial frequency domain. First, the random phase noise, exp[i 2π n_{s} (x )] multiplies the primary data,s (x ). Then, this data passes through lens 1 which means the Fourier transform ofs (x )exp[i 2π n_{s} (x )]. To obtain the convolution result betweens (x )exp[i 2π n_{s} (x )] andh (x ) where the Fourier transform ofh (x ) is ℑ{h (x )}=exp[i 2π n_{f} (μ )], Fourier transforms ofs (x )exp [i 2π n_{s} (x )] andh (x ) are multiplied by each other. Finally, the inverse Fourier transform of this data can be recorded through lens 2. That is, the encrypted data by DRPE,s_{e} (x ) is a complex value as the following: [13]where ℑ and ℑ^{1} mean Fourier transform and inverse Fourier transform, respectively. By the characteristics of the complexvalued function, encrypted data has amplitude and phase, i.e.,
s_{e} (x ) = s_{e} (x )exp[iϕ (x )].Figure 1 (b) illustrates the optical schematic setup of DRPE for decryption. To decrypt the primary data, encrypted data as shown in Eq. (1) is multiplied by complexconjugate of Fourier transform of
h (x ) as the following: [13]In integral imaging, multiple elemental images can be captured by a pickup process [25, 28] and their decrypted elemental images can be obtained by Eq. (2). Then, 3D computational reconstruction can be implemented by the following [25]:
where Δ
x =N_{x}fp /(c_{x}z_{r} ) is the shifting pixels for computational reconstruction of integral imaging,N_{x} is the total number of pixels for each elemental image,f is the focal length of pickup lens,p is the pitch between pickup lenses,c_{x} is the image sensor size in thex direction,z_{r} is the reconstruction depth,K is the number of elemental images in thex direction, andO (x ,z_{r} ) is the overlapping factors among all elemental images at the reconstruction depthz_{r} .III. TRANSMISSION OF OPTICAL ENCRYPTED DATA THROUGH WIRELESS CHANNEL
We consider an elemental image with size
M ×N as the encrypted signal for transmission through a wireless communication channel, and it is assumed that the receiver has perfect phase information of encrypted data, i.e.,ϕ (x ). Thus, in this paper, we focus on the transmission of only the amplitude of encrypted data. The amplitudes of encryption output from Eq. (1) can be expressed as anM ×N matrix with normalized real values between 0 and 1, which is written aswhere
v_{i,j} represents the normalized amplitude for the pixel at (i ,j ) on theM ×N encrypted image. By sampling the normalized values in Eq. (4) with the sampling interval per dimension,L , theM ×N encrypted matrix is shrunk to the ⎡M / L ⎤ ×⎡N / L ⎤ matrix, and then the shrunk matrix is transformed into a vector as follows:where
M_{s} = ⌈M/L ⌉ −1,N_{s} = ⌈N/L ⌉ −1, T is the transpose of a matrix, and L can be adjusted according to available channel capacity.For digital modulation, each normalized value in Eq. (5) is quantized with 16 uniform levels (i.e., 0, 1, 2, …, and 15), and then the quantized values are respectively mapped into the corresponding 4bits sequences. For instance, if
v_{i,j} =0, 0.6, and 1, then the quantized values are 0, 9, and 15, respectively, and the corresponding 4bits sequences are 0000, 1001, 1111, respectively. In order to transmit the 4bits sequences through a wireless channel, the 4bits information is sequentially modulated with 16ary square quadratic amplitude modulation (QAM), where a Gray code is used to assign 4tuples with only onebit difference to two adjacent signals in the QAM constellation [21].In this paper, a wireless channel is assumed to be timevarying frequencyflat Rayleigh fading that is one of the most typical wireless channels [2123]. Then, with the symbol duration,
T , the received signal is expressed aswhere
c (kT ) denotes the complex coefficient of a timevarying frequencyflat Rayleigh fading channel with unit average power,s_{QAM} (kT ) represents the QAMmodulated signal with an average power,P , which is a transmit power at the transmitter, andε (kT ) denotes the complex additive white Gaussian noise with zero mean and unit variance. Thus, the average signaltonoise ratio (SNR) equalsP . For generating the timevarying Rayleigh fading channel, we use a Jakes model [22] with the parameters of a carrier frequency and a receiver speed.In order to detect the transmitted signal at the receiver, the maximum likelihood (ML) detection [23] is adopted as follows:
where (
kT ) is the estimated QAM signal,s_{QAM,q} is theq th signal among 16 possible QAM signals, and (kT ) is the estimated channel coefficient. In this paper, we consider perfect channel estimation, i.e., (kT ) =c (kT ), and no channel estimation, i.e., (kT ) = 1. The estimated signals obtained from ML detection are sequentially mapped into the corresponding 4bits sequences, using the same QAM constellation as used at the transmitter. Then, the estimated 4bits sequences are changed into the corresponding quantization values, respectively, and the ⌈M/L ⌉×⌈N/L ⌉matrix is constructed using the normalized values of the obtained quantization ones. Finally, the ⌈M/L ⌉×⌈N/L ⌉ matrix is expanded into theM ×N matrix with inserting zeros, which is expressed aswhere , is the estimated value for the (
i,j )th normalized value of theM ×N encrypted matrix in Eq. (4).For integral imaging, the amplitudes of encrypted multiple images with size
M ×N are sequentially transmitted over a wireless channel. Thus, the receiver can successively obtain  (x )  in Eq. (8) for each encrypted image.IV. OPTICAL EXPERIMENT AND SIMULATION RESULTS
Figure 2 shows the optical setup for recording 3D objects. To record multiple 2D images optically, we used synthetic aperture integral imaging (SAII). We capture 8×8 elemental images which have 2496(H)×1664(V) pixels. The focal length of the pickup camera is 50 mm. The pitch between cameras is 2 mm.
Figures 3 and 4 show the experimental results for 2D/3D optical encryption with wireless channel. In the 3D encrypted data transmission simulation, we used the wireless channel parameters as SNR is 20 dB and 20 dB, the carrier frequency is 2GHz, the receiver speed is 3km/h, the symbol duration,
T , is 0.1ms, and the sampling interval per dimension,L , is 3. As shown in Fig. 3(a), two different objects (true class: car, false class: tank) with different depths (car: 290 mm and tank: 340 mm) are used as primary images. The encrypted 2D elemental image by using Eq. (1) is shown in Fig. 3(b). It seems the noiselike image. Using Eq. (2) and Eqs. (4)(8), the decrypted 2D elemental images with various wireless channel environments and no channel estimation as shown in Fig. 3(d) and (f) can be generated. In addition, the decrypted 2D elemental images with channel estimation as shown in Fig. 3(c) and (e) can be estimated. They are still not recognizable. However, using Eq. (3) which is 3D computational reconstruction of integral imaging, the reconstructed 3D images can be obtained as shown in Fig. 4. In Fig. 4(b), tank images are darker because it has lower light intensity. As shown in Fig. 4, the reconstructed 3D images with channel estimation have higher visual quality than the one without channel estimation. However, in 20 dB SNR case, both of them have almost the same visual quality.To compare the performance of our method, the kthlaw nonlinear correlation filter [24] and peak correlation energy (PCE) are introduced. The nonlinear correlation filter is designed by the following [24]:
where
I _{ref} (x ,z_{ref} ) is the reference 3D image at reference reconstruction depth,z_{ref} ,ϕ (m ) is the phase information of the reconstructed 3D image,I (x ,z_{r} ),ψ (m ) is the phase information of the reference 3D image, andk is the nonlinear coefficient.Then, to select the optimum
k value of this correlation filter, we used PCE as defined by:Figure 5 illustrates the correlation results of 3D reconstructed images for each wireless channel environment. The reference reconstruction depth is
z_{ref} =290 mm (car). Thus, in Fig. 5, the highest PCE value can be observed atz =290 mm for each wireless channel environment. In Fig. 5, maximum PCE values are 0.9087×10^{3} (20 dB SNR, channel estimation), 0.8094×10^{3} (20 dB SNR, no channel estimation), 2.7475 ×10^{3} (20 dB SNR, channel estimation), and 1.4363×10^{3} (20 dB SNR, no channel estimation) at reconstruction depthz_{r} =290 mm. For wireless channel environment with 20 dB SNR and channel estimation, PCE value is the highest. However, for wireless channel environment with 20 dB SNR, PCE values of both channel estimation and no channel estimation are almost the same. It means that the channel estimation is not efficient for the case of the severe noise environment or the low transmit power.On the other hand, Fig. 6 shows the correlation results of 2D decrypted images for each wireless channel environment. The reference image is the primary image as shown in Fig. 3(a). In Fig. 6, PCE values are 0.1613×10^{3} (20 dB SNR, channel estimation), 0.1720×10^{3} (20 dB SNR, no channel estimation), 0.4243×10^{3} (20 dB SNR, channel estimation), and 0.1959×10^{3} (20 dB SNR, no channel estimation) at all reconstruction depths, because 2D images do not have any depth information.
Figures 7 and 8 show the nonlinear correlation results (
k =0.3) of the reconstructed 3D images for true and false classes with and without channel estimation. As shown in Fig. 7(c), the highest correlation peak can be observed for the reconstructed 3D image with 20 dB SNR and channel estimation of true class. In addition, correlation peaks for the reconstructed 3D images with 20 dB SNR using channel estimation and no channel estimation are similar to each other. Thus, channel estimation is inefficient for the 20 dB SNR case. For the false case, the flat correlation results can be achieved as shown in Fig. 8. Therefore, it proves that our proposed method can authenticate the 3D information of optically encrypted objects.V. CONCLUSION
In this paper, we have presented the optical encryption and information authentication of 3D objects with wireless channel characteristics. The wireless channel environment has several factors such as channel noise, channel fading, and so on. Using digital modulation and ML detection, we have estimated the encrypted information transmitted over a wireless channel and then decrypted the primary image at the receiver. In addition, introducing the computational volumetric reconstruction of 3D integral imaging, 3D information of the primary image can be obtained. This reconstruction method may remedy the residual noise after ML detection. We have proven that our method can effectively mitigate wireless channel effects by using 3D optical encryption technique and carrying out the simulation of wireless transmission. Also, our method shows that the performance of information authentication for optical encryption is improved using nonlinear correlation filters. In future plans, we will consider more wireless channel parameters and study various modulation and estimation methods. In addition, we will apply our method to various threedimensional imaging or photon counting encryption techniques.

[FIG. 1.] Optical schematic setup of doublerandomphase encryption technique for (a) encryption and (b) decryption.

[FIG. 2.] Optical setup for recording 3D objects using synthetic aperture integral imaging.

[FIG. 3.] Experimental results of optical encryption for 2D images using double random phase encryption. (a) primary image, (b) encrypted 2D image, (c) decrypted 2D image with 20 dB SNR using channel estimation, (d) decrypted 2D image with 20 dB SNR using no channel estimation, (e) decrypted 2D image with 20 dB SNR using channel estimation, and (f) decrypted 2D image with 20 dB SNR using no channel estimation.

[FIG. 4.] Experimental results of optical encryption for 3D images using double random phase encryption. (a) true class (car) result; original 3D image reconstruction and enlarged image (left), reconstructed 3D image with 20 dB and 20 dB SNRs using channel estimation (front), and reconstructed 3D image with 20 dB and 20 dB SNRs using no channel estimation (right). (b) false class (tank) result; original 3D image reconstruction and enlarged image (left), reconstructed 3D image with 20 dB and 20 dB SNRs using channel estimation (front), and reconstructed 3D image with 20 dB and 20 dB SNRs using no channel estimation (right).

[FIG. 5.] Peak Correlation Energy (PCE) value of the reconstructed 3D images for various wireless channel environments via various reconstruction depths.

[FIG. 6.] Peak Correlation Energy (PCE) value of the decrypted 2D images for various wireless channel environments via various reconstruction depths.

[FIG. 7.] Nonlinear correlation results (k=0.3) of the reconstructed 3D images for true class with and without channel estimation.

[FIG. 8.] Nonlinear correlation results (k=0.3) of the reconstructed 3D images for false class with and without channel estimation.