검색 전체 메뉴
PDF
맨 위로
OA 학술지
Dual Optical Encryption for Binary Data and Secret Key Using Phase-shifting Digital Holography
  • 비영리 CC BY-NC
  • 비영리 CC BY-NC
ABSTRACT

In this paper, we propose a new dual optical encryption method for binary data and secret key based on 2-step phase-shifting digital holography for a cryptographic system. Schematically, the proposed optical setup contains two Mach-Zehnder type interferometers. The inner interferometer is used for encrypting the secret key with the common key, while the outer interferometer is used for encrypting the binary data with the same secret key. 2-step phase-shifting digital holograms, which result in the encrypted data, are acquired by moving the PZT mirror with phase step of 0 or π/2 in the reference beam path of the Mach-Zehnder type interferometer. The digital hologram with the encrypted information is a Fourier transform hologram and is recorded on CCD with 256 gray level quantized intensities. Computer experiments show the results to be encryption and decryption carried out with the proposed method. The decryption of binary secret key image and data image is performed successfully.


KEYWORD
Optical encryption , Digital holography , Phase-shifting interferometry , Cryptosystem
  • I. INTRODUCTION

    Nowadays, as the communication network such as the internet and mobile net develops, multimedia contents are expanding. Despite widespread use of digital multimedia data, there have been threats and attacks to information in communication systems. For this reason, information security becomes very important and necessary. In order to protect original information such as multimedia data, a number of electronic or optical cryptosystems have been proposed. One of the simple methods to ensure security is considering all data as binary strings and encrypting them using encryption algorithms such as DES(Data Encryption Standard) or AES (Advanced Encryption Standard). [1] Encryption is the process of transforming the plain data to the cipher data by a security key (such as a common key or a secret key) to ensure its security. In order for an authorized user to decrypt the cipher , the same correct security key has to be known to the authorized user. In conventional symmetric key cryptography, the security key is opened by all the users as a common key which is not transmitted to users. Therefore, this type of algorithm has a weak point against data interception by an unauthorized user. Since a security key is the core of most data cryptosystems, the protection of the security key is also very important. In general, when the multimedia data is static, it can be treated as binary data and the conventional electronic encryption methods can be used. However, these methods involve amounts of computations and are not fast enough for high-volume multimedia data. [2] Recently, various kinds of optical encryption techniques have been proposed for security systems because optical systems have merits of parallel processing and fast operation. [3-11] Among them the optical information is composed of complex function which is in phase and amplitude forms, and in order to get the complex encrypted data, a holographic recording technique may be required. This requirement makes it difficult to store and transmit the encrypted information over a digital network. However, optical encryption and decryption to record and reconstruct the complex values can be easily performed using a phase-shifting digital holographic technique. [13-16] Recently, we have presented some papers on the optical encryption using the phase-shifting digital holographic method. [17-22]

    In this paper, we propose a dual optical encryption method for binary image data and secret key based on 2-step phase-shifting digital holography for a cryptographic system, and show the performance of the proposed system for dual cryptography. The encrypted Fourier transform hologram is obtained by phase-shifting a digital holographic technique from an optical setup based on a Mach-Zehnder type interferometer, which is a 256 gray level quantized digital hologram recorded by CCD. The encrypted digital hologram can be transmitted over a digital communication network. The decryption is carried out electronically by computer. In Section Ⅱ, the encryption and decryption technique with 2-step phase-shifting digital holography are described. In Section Ⅲ, computer experiments show results of the encryption and the decryption with the proposed method. Finally, conclusions are briefly summarized in Section Ⅳ.

    II. ENCRYPTION AND DECRYPTION

    The main idea in the proposed method to encrypt binary data is to make more highly secure encryption and decryption, which is accomplished by encrypting and transmitting the individual security key, called secret key or private key, and this encrypted security key is used to decrypt the original binary data. Input data to be encrypted is binary bit data or a binary image, and a gray-level optical image can be encrypted after processing the gray-level image into the digitized 8-bits binary data by an analog-to-digital ASCII encoding method. [20, 21]

    Figure 1 shows the optical setup for the dual optical encryption system for the binary data using the 2-step phase-

    shifting digital holographic method, which is based on Mach-Zehnder interferometer architecture. Schematically, the optical setup contains two Mach-Zehnder interferometers. Beam splitters BS1 and BS2 divide collimated light into two plane waves as the reference and the object beams. With shutters S1, S2 open and S3 closed, the inner interferometer is operated for encrypting the secret (or private) key of the user with the common (or public) key. The collimating light after being reflected by the PZT mirror illuminates the spatial light modulator (SLM1) which displays the binary secret key to be encrypted. The output beam from SLM1 is multiplied by a random phase mask (RPM1), and is Fourier transformed on the charge coupled device (CCD1) by lens L1 as the object beam. The other collimating light by BS2 after reflecting on a mirror M1 illuminates the SLM2 which displays the binary common key code, resulting in Fourier transform on the CCD1 by lens L2 as the reference beam, where another random phase mask (RPM2) is multiplied with the SLM2. The random phase mask improves to widen the dynamic range of the Fourier transform in the spatial frequency domain on the CCD. With shutters S1, S3 open and S2 closed, the outer interferometer is operated for encrypting the information data such as binary data or image with the secret key. In this case, the light from SLM1 is operated as the reference beam, while the light from SLM3, RPM3 and L3 is operated as the object beam. In this path, an attenuator(A) is used for controlling the reference-to-object beam ratio properly for acquiring a vivid interference pattern. The interference pattern from these two Fourier transformed beams is recorded on the CCD2.

    In the previous papers [19, 22], we described the encryption and decryption principle by using the 2-step phase-shifting digital holographic method.

    Let |s(x,y)| be a binary secret key to be encrypted and exp[s(x, y)] be a random phase pattern, where x and y are transversal coordinates at the input spatial plane. The multiplication of the two is represented as

    image

    Fourier transform of s(x, y) is expressed as

    image

    where α and β are transversal coordinates at the spatial frequency plane.

    Let |c(x,y)| be a binary common key and exp[c(x, y)] be anot her random phase pattern. The multiplication of the two is represented as

    image

    Fourier transform of c(x,y) is expressed as

    image

    Then, the digital holographic intensity pattern recorded by the CCD1 at the spatial frequency plane is given by

    image

    with the object beam and the reference beam given by Eqs. (2) and (4), where Δ?SC = S? C is the phase difference between the object and the reference beams. The phase-shifting interferometry method gives the exact reconstruction of the phase difference between the object and the reference beams and amplitude of these two beams. Two intensity patterns in the form of digital holograms are achieved by 2-step phase-shifting digital holography with the reference beam phase shifted by 0 or π/2. The PZT mirror can allow phase shift with phase steps of π/2 by moving the mirror properly. This 2-step phase-shifting digital holography has a merit of the reduced number of holograms compared to multi-step phase-shifting holography. By rewriting Eq. (5), 2-step phase-shifting digital holograms are represented as

    image

    These two digital holograms are encrypted data, which are stored in a computer and transmitted through the digital communication network.

    After DC-term removal technique is applied to Eq. (6), the phase difference of object beam and reference beam and the magnitude are calculated as follows. [22]

    image
    image

    where I1' and I2' are modified holographic intensities after DC-term removal.

    From Eqs. (7) and (8), the complex hologram1 with secret key encryption information is expressed as

    image

    Similarly, we can encrypt binary data or image with the secret key. Let b(x, y) be binary data or image to be encrypted and exp[b(x, y)] be a random phase pattern. The multiplication of the two is represented as

    image

    The Fourier transform of b(x, y) is expressed as

    image

    Then, the digital holographic intensity pattern recorded by the CCD2 at the spatial frequency plane is given by

    image

    with the object beam and the reference beam given by Eqs. (11) and (2), where Δ?BS = B? S is the phase difference between the object and the reference beams.

    After carrying out the 2-step phase-shifting digital holographic method, the phase difference of object beam and reference beam and the magnitude are acquired as follows.

    image
    image

    where I3' and I4' are modified holographic intensities after DC-term removal.

    From Eqs. (13) and (14), the complex hologram2 with data encryption information is expressed as

    image

    In order to get the complex distribution B(α , β) and decrypt the original binary data or image, we need the complex distribution S(α , β) of the secret key. Note that it is possible to get S(α , β) by Eq. (9) with knowledge of the complex hologram1 because the Fourier transform pattern of the secret key, Eq. (4), is acquired by the opened and known binary common key code of c(x, y). We need the intensity distribution |C(α, β)|2 of the common key in order to reconstruct S(α , β). This intensity |C(α, β)|2 is acquired when we get the DC-term information on the CCD1 by removing the object beam in the optical setup shown in fig. 1, which is done by closing the shutter S1, S3 and opening the shutter S2 only. And we also need the intensity distribution |S(α, β)|2 of the secret key in order to reconstruct B(α , β). Similarly, the only object beam intensity recorded on the CCD2 gives |S(α, β)|2 by closing the shutter S1, S2 and opening the shutter S3 in the optical setup shown in fig. 1. Using the complex hologram1, hologram2 and the common key, the reconstructed complex

    distribution is obtained by

    image
    image

    By using an inverse Fourier transformation, the original data information is reconstructed and the original binary data or image is decrypted after carrying out the proper threshold.

    image

    Figure 2 shows block diagram of dual encryption and decryption procedure.

    III. COMPUTER EXPERIMENTS

    We show the performance of the proposed dual optical encryption method by computer simulations. The binary bit code of size 256×256 pixels shown in Fig. 3(a) is used as the common key which is random generated for convenience, and the binary images(Girl1 and Girl2) of size 256×256 pixels shown in Fig. 3(b) and (c) are used as the user’s secret keys to be encrypted, respectively. These secret keys can be interpreted as the user’s own watermark images for authentication cryptography. The binary image data of size 256×256 pixels shown in Fig. 3(d) is used as input data to be encrypted by the user’s secret key.

    Figure 4 shows an example of the encrypted digital holograms which are recorded on CCDs. Each hologram is quantized with 256 gray levels. The histogram of the encrypted secret key1 shown in Fig. 4(a), which has a uniform and random gray-level distribution, is the one of the acquired 256 gray level histogram patterns using 2-step phase-shifting digital holography. Similarly, Fig. 4(b) shows the one of the acquired 256 gray level histogram patterns of the encrypted binary image using 2-step phase-shifting digital holography.

    From the complex holograms calculated by the retrieved phase and amplitude from the encrypted data, reconstruction and decryption of the encrypted secret key and the encrypted image are carried out successfully. For example, Fig. 5(a) shows the reconstructed secret key1 image pattern when the correct common key is used for the secret key decryption. Fig. 5(b) is the decrypted binary image(Girl1) after binarization with the proper threshold. The decrypted binary image is the exact same original secret key1 image and

    has no error when the same correct common key is used for decryption. This secret key can also be interpreted as watermark of the user1. Fig. 5(c) shows the phase map representation of the Fourier transform of the reconstructed secret key1 by the reconstructed complex hologram1 and the common key.

    Figure 6(a) shows the reconstructed image pattern when the secret key1 of user1 is used for the encrypted hologram2 which is encrypted by the secret key1. We investigated the distribution of the pixel magnitude of the reconstructed image pattern and signal-to-noise ratio. One of the cross sections in the reconstructed image is shown in Fig. 6(b) and (c). The magnitude of the signal bits(one value in the original image) is about 1 in Fig. 6(b), but the magnitude of the noise bits(zero value in the original image) is below about 0.2 in Fig. 6(c). Since the magnitude of the signal

    bits is much greater than the magnitude of the noise bits, the reconstructed image can be decrypted into the original image when the proper threshold value is well defined. Fig. 6(d) is the decrypted binary image after binarization with the proper threshold value of 0.3. The decrypted binary image is the exact same original image data and has no error when the same correct secret key1 is used for decryption.

    Figure 7(a) shows the reconstructed image pattern when the secret key2 of user2 is used for the encrypted hologram2 which is encrypted by the secret key1. This reconstructed pattern has a different intensity pattern(i.e. random pattern) compared to the one shown in Fig. 6(a). We also investigated the magnitude distribution of the cross section in the reconstructed image and signal-to-noise ratio. Fig. 7(b) and (c) show the results. Since the magnitude of the noise bits of some pixels are greater than the magnitude of signal bits, the proper threshold value cannot be defined. Therefore, the reconstructed image cannot be decrypted into the original image. Fig. 7(d) is the decrypted binary image after binarization with the same threshold value of 0.3.

    IV. CONCLUSIONS

    We propose a new dual optical encryption method for binary data and secret key based on 2-step phase-shifting digital holography for a cryptographic system. Dual optical encryption is implemented by constructing two Mach-Zehnder type interferometers simultaneously. The inner interferometer is used for encrypting the secret key with the common key, while the outer interferometer is used for encrypting the binary data with the same secret key. This proposed dual optical encryption method provides a more advanced cryptosystem to use double encryption in the binary data and has advantages of compactness and easy configuration of the optical system. For the case of applying the proposed method to encrypt a binary image data with a secret key image, a highly secure encryption is achieved. Computer experiments verified that the proposed method is perfect and suitable for cryptographic applications and secure communication systems.

참고문헌
  • 1. Stinson D. R. 2006 Cryptography Theory and Practice google
  • 2. Li C., Li S., Asim M., Nunez J., Alvarez G., Chen G. (2009) “On the security defects of an image encryption scheme” [Image and Vision Computing] Vol.27 P.1371-1381 google
  • 3. Javidi B., Horner J. L. (1994) “Optical pattern recognition for validation and security verification” [Opt. Eng.] Vol.33 P.1752-1756 google
  • 4. Heanue J. F., Bashaw M. C., Hesselink L. (1995) “Encrypted holographic data storage based on orthogonal-phase-code multiplexing” [Appl. Opt.] Vol.34 P.6012-6015 google
  • 5. Refregier P., Javidi B. (1995) “Optical image encryption based on input plane and Fourier plane random encoding” [Opt. Lett.] Vol.20 P.767-769 google
  • 6. Javidi B., Sergent A., Ahouzi E. (1998) “Performance of double phase encoding encryption technique using binarized encrypted images” [Opt. Eng.] Vol.37 P.565-569 google
  • 7. Weber D., Trolinger J. (1999) “Novel implementation of nonlinear joint transform correlators in optical security and validation” [Opt. Eng.] Vol.38 P.62-68 google
  • 8. Cuche E., Bevilacqua F., Depeursinge C. (1999) “Digital holography for quantitative phase-contrast imaging” [Opt. Lett.] Vol.24 P.291-293 google
  • 9. Javidi B., Nomura T. (2000) “Securing information by means of digital holography” [Opt. Lett.] Vol.25 P.28-30 google
  • 10. Unnikrishnan G., Singh K. (2000) “Double random fractional Fourier domain encoding for optical security” [Opt. Eng.] Vol.39 P.2853-2859 google
  • 11. Lin G.-S., Chang H. T., Lie W.-N., Chuang C.-H. (2003) “Public-key-based optical image cryptosystem based on data embedding techniques” [Opt. Eng.] Vol.42 P.2331-2339 google
  • 12. Nomura T., Okazaki A., Kameda M., Morimoto Y. (2005) “Image reconstruction from compressed encrypted digital hologram” [Opt. Eng.] Vol.44 P.2313-2320 google
  • 13. Hariharan P. (1987) “Digital phase-shifting interferometry : a simple error compensating phase calculation algorithm” [Appl. Opt.] Vol.26 P.2504-0505 google
  • 14. Yamaguchi I., Zhang T. (1998) “Phase-shifting digital holography” [Opt. Lett.] Vol.22 P.610-612 google
  • 15. Jeong M.-O., Kim N., Park J.-H. (2008) “Elemental image synthesis for integral imaging using phase-shifting digital holography” [J. Opt. Soc. Korea] Vol.12 P.275-280 google
  • 16. Liu J.-P., Poon T.-C., Jhou G.-S., Chen P.-J. (2011) “Comparison of two-, three, and four-exposure guadrature phase-shifting holography” [Appl. Opt.] Vol.50 P.2443-2450 google
  • 17. Lee H. J., Gil S. K. (2006) “Error analysis for optical security by means of 4-step phase-shfting digital hologaphy” [J. Opt. Soc. Korea] Vol.10 P.118-123 google
  • 18. Gil S. K., Jeon S. H., Kim N., Jeong J. R. (2006) “Successive encryption and transmission with phase-shifting digital holography” [Proc. SPIE] Vol.6136 P.339-346 google
  • 19. Gil S. K., Byun H. J., Lee H. J., Jeon S. H., Jeong J. R. (2007) “Optical encryption of binary data information with 2-step phase-shifting digital holography” [Proc. SPIE] Vol.6488 P.648812 google
  • 20. Jeon S. H., Hwang Y. G., Gil S. K. (2008) “Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method” [Opt. Rev.] Vol.15 P.181-186 google
  • 21. Jeon S. H., Gil S. K. (2010) “QPSK modulation based optical image cryptosystem using phase-shifting digital holography” [J. Opt. Soc. Korea] Vol.14 P.97-103 google
  • 22. Jeon S. H., Gil S. K. (2011) “2-step phase-shifting digital holographic optical encryption and error analysis” [J. Opt. Soc. Korea] Vol.15 P.244-251 google
이미지 / 테이블
  • [ FIG. 1. ]  Dual optical encryption system for binary data using the 2-step phase-shifting digital holographic method.
    Dual optical encryption system for binary data using the 2-step phase-shifting digital holographic method.
  • [ FIG. 2. ]  Block diagram of the dual encryption/decryption procedure.
    Block diagram of the dual encryption/decryption procedure.
  • [ FIG. 3. ]  A binary pattern for computer simulations (256×256 pixels): (a) a binary bit code (a random generated code) as a common key, (b) a binary image (Girl1) as a secret key1 of user1, (b) a binary image (Girl2) as a secret key2 of user2, (d) a binary image (Monkey) to be encrypted and decrypted as information data.
    A binary pattern for computer simulations (256×256 pixels): (a) a binary bit code (a random generated code) as a common key, (b) a binary image (Girl1) as a secret key1 of user1, (b) a binary image (Girl2) as a secret key2 of user2, (d) a binary image (Monkey) to be encrypted and decrypted as information data.
  • [ FIG. 4. ]  Example of the encrypted digital holograms (256×256 pixels) with 256 gray levels obtained by using 2-step phase-shifting digital holography: (a) the histogram of the encrypted secret key1 (Girl1), (b) the histogram of the encrypted binary image (Monkey).
    Example of the encrypted digital holograms (256×256 pixels) with 256 gray levels obtained by using 2-step phase-shifting digital holography: (a) the histogram of the encrypted secret key1 (Girl1), (b) the histogram of the encrypted binary image (Monkey).
  • [ FIG. 5. ]  Result of decryption for the secret key1 shown in FIG. 3 (b) when the same common key is used: (a) a reconstructed image pattern by decryption process, (b) a decrypted binary image (Girl1) after binarization with the proper threshold value, (c) a phase map representation of the Fourier transform of the reconstructed the secret key1 by the reconstructed complex hologram1 and the common key.
    Result of decryption for the secret key1 shown in FIG. 3 (b) when the same common key is used: (a) a reconstructed image pattern by decryption process, (b) a decrypted binary image (Girl1) after binarization with the proper threshold value, (c) a phase map representation of the Fourier transform of the reconstructed the secret key1 by the reconstructed complex hologram1 and the common key.
  • [ FIG. 6. ]  Result of decryption for the binary image shown in FIG. 3(d) when the secret key1 of user1 is used: (a) a reconstructed image pattern by decryption process, (b) a graph showing the signal bits of the 100th row of the reconstructed image in FIG. 6(a), (c) a graph showing the noise bits of the 100th row of the reconstructed image in FIG. 6(a), (d) the correct decrypted binary image (Monkey) after binarization with the proper threshold value.
    Result of decryption for the binary image shown in FIG. 3(d) when the secret key1 of user1 is used: (a) a reconstructed image pattern by decryption process, (b) a graph showing the signal bits of the 100th row of the reconstructed image in FIG. 6(a), (c) a graph showing the noise bits of the 100th row of the reconstructed image in FIG. 6(a), (d) the correct decrypted binary image (Monkey) after binarization with the proper threshold value.
  • [ FIG. 7. ]  Result of decryption for the binary image shown in FIG. 3 (d) when the secret key2 of user2 is used: (a) a reconstructed image pattern by decryption process, (b) a graph showing the signal bits of the 100th row of the reconstructed image in FIG. 7(a), (c) a graph showing the noise bits of the 100th row of the reconstructed image in FIG. 7(a), (d) the incorrect decrypted binary image after binarization with the same threshold value as in FIG. 6 (d).
    Result of decryption for the binary image shown in FIG. 3 (d) when the secret key2 of user2 is used: (a) a reconstructed image pattern by decryption process, (b) a graph showing the signal bits of the 100th row of the reconstructed image in FIG. 7(a), (c) a graph showing the noise bits of the 100th row of the reconstructed image in FIG. 7(a), (d) the incorrect decrypted binary image after binarization with the same threshold value as in FIG. 6 (d).
(우)06579 서울시 서초구 반포대로 201(반포동)
Tel. 02-537-6389 | Fax. 02-590-0571 | 문의 : oak2014@korea.kr
Copyright(c) National Library of Korea. All rights reserved.