For the application of multiusers, the arrangement and distribution of the keys is a much concerning problem in a cryptosystem. In this paper, we propose an optical encryption scheme with multiple users based on computational ghost imaging (CGI) and orthogonal modulation. The CGI encrypts the secret image into an intensity vector rather than a complex-valued matrix. This will bring convenience for post-processing and transmission of the ciphertext. The orthogonal vectors are taken as the address codes to distinguish users and avoid cross-talk. Only the decryption key and the address code owned by an authorized user are matched, the secret image belonging to him/her could be extracted from the ciphertext. Therefore, there are two security levels in the encryption scheme. The feasibility and property are verified by numerical simulations.
In recent years, optical information processing techniques have been widely applied in the field of information security, as they can offer the advantages of high-speed parallel processing and multiple degrees of freedom (such as amplitude, phase, wavelength, and polarization). Especially since the double random-phase encryption method [1] was proposed, all kinds of random-phase encoding (RPE) schemes based on diffraction or interference principles have been booming [2-13]. As the accompanying complementary opposites, the corresponding security analyses have also been carried out and have promoted the further development of optical encryption techniques [14-18].
In practice, the distribution, transmission and storage of the ciphertext and key are important problems that need to be solved especially in the application of multiple users. Since ghost imaging (GI) experiments based on quantum entangled photon pairs [19] and a classical light source [20] were performed, GI, as an intriguing optical technique, has been receiving considerable current attention [21-25]. Recently as a development of GI, the computational ghost imaging (CGI) is successfully applied in the field of optical cryptography [26], which noticeably reduces the number of bits required to transmit and store, because the ciphertext is not a complex-valued matrix but simply an intensity vector. Subsequently, many methods were proposed to improve the security and develop its application [27-32]. In addition, several secret sharing schemes were proposed based on combination theory [33-35], in which a secret image is encrypted into multiple parts and transmitted separately to multiple users, and the secret can only be decrypted by the qualified set of users. This technique is a verification scheme for multiple users and brings security in many practical applications.
In some other applications of multiusers, the sender needs to transmit different secret images to different authorized users. If the ciphertext of the multiple secret images is shared for all authorized users but anyone of them can only extract his/her own secret image with his/her own key, the burden of transmitting huge amounts of secret data borne by the channel will be reduced. In recent years, the orthogonal codes are utilized to design the keys for different authorized users to avoid the secret images being extracted mutually [36-38]. In this paper, we combine the CGI and the orthogonal modulation to achieve a secure and convenient scheme for multiuser application. In this scheme, all the secret images are firstly encrypted by CGI technique, and then modulated by an orthogonal matrix to obtain the ciphertext. The random-phase masks in CGI are taken as the encryption key and each vector in the orthogonal matrix is an address code for each user. Only the encryption key and address code are matched, the secret image could be retrieved from the ciphertext. There are two security levels in the encryption scheme to ensure the security of the secret images.
II. ENCRYPTION SCHEME WITH MULTIPLE USERS
The schematic and flow chart of the encryption process are shown in Fig. 1. A spatially coherent laser is split into
Each modified beam illuminates a secret image
According to the principle of CGI, the process illustrated above is repeated
and
where (
* denotes the 2D convolution operation. h(x, y, z) is the point pulse function of the Fresnel transform described by
where ,
Thus,
Subsequently, the matrix
In summary, all the secret images are firstly encrypted by random-phase masks in the system of CGI, and then modulated by an orthogonal matrix
We know that the orthogonal code satisfies
where
Therefore, each column of the orthogonal matrix
In the following step, the secret image can be retrieved by the principle of CGI according to the extracted sequence and the calculated decryption key
where <
III. COMPUTER SIMULATION RESULTS
3.1. Feasibility of the Proposal
To verify the feasibility of the proposal, four binary and grayscale images (shown in Fig. 3) with 128×128 pixels are taken as the secret images. In addition, a 4×4 orthogonal matrix
Based on the principle of CGI [21, 22], the retrieved images are present in Figs. 4 and 5, respectively corresponding to the binary and grayscale images under the conditions that the address code and the decryption key are matched or unmatched. Because of the limited resolution of CGI [21, 22], the number of measurements needed to make the decryption image achieve acceptable quality for grayscale image is larger than binary image. Here, we take the number of measurements
In encryption, the random-phase masks are taken as the encryption key and each vector in the orthogonal matrix is an address code for each user. There are two security levels in the encryption scheme to ensure the security of the secret images. Subsequently, we take the binary images as an example to further test the security of the proposal. Firstly, the four decryption keys are directly utilized to retrieve the secret images in absence of the address codes, the results are shown in Fig. 6(a)-(d). Furthermore, a wrong orthogonal matrix (such as O´=[1 2 1 1; −2 1 −1 1; 1 1 −2 −1; −1 1 1 −2]), which is randomly selected as the address codes, and the correct decryption keys are adopted in the decryption process, the recovered images are shown in Fig. 6(e)-(h). The results indicated that the secret images cannot be retrieved whether by not using the address codes or by using the wrong address codes.
In this paper, we propose a simple and convenient optical encryption scheme for multiple users. This scheme adopts two encryption levels: CGI and orthogonal modulation. The CGI encrypts the secret image into an intensity vector rather than the complex-valued matrix, which reduces the data amount of the ciphertext and brings convenience for post-processing. Other, an orthogonal matrix is also utilized to modulate the detected intensity sequences from the CGI system. According to the property of the orthogonal matrix, each of the detected sequence corresponding to a secret image can be extracted from the ciphertext by a row vector of the orthogonal matrix. Thus all the row vectors of the orthogonal matrix are regarded as the address codes for all the secret images. This function may bring convenience in the application of multiusers. The secret images can be decrypted only when the address code and the decryption key are matched. However, the decrypted images contain serious noise, which is unavoidable for CGI but in some extent can be reduced by increasing the number of measurements or adopting other improved CGI [24, 25].