|
During the past decade, a lot of effort has been made to develop the techniques of optical cryptography owing to the inherent nature of parallel and multidimensional capability of optical signal processing.1, 2, 3 Most of those optical cryptosystems employ random phase masks (RPMs) as secret keys due to the advantage of huge key space. They always contribute to resistance of an encryption scheme against brute force attacks. However, RPMs are not sufficiently sensitive as expected. This may result in another security worry. It has been recently demonstrated that the double random phase encoding scheme is vulnerable to known-plaintext attacks.4, 5, 6 With phase retrieval techniques, an attacker can easily find the estimates of RPM keys, with which the attacker can recover the plaintext from the corresponding ciphertext. Nevertheless, using phase retrieval strategy to access estimates of RPM keys is only available for linear systems. From another perspective, if employing an appropriate nonlinear transform for encryption, we find out that the insensitivity of RPM will not only avoid suffering a potential crack, but also may allow a cryptosystem possessing other unique features, as introduced later. From the cryptography point of view, a symmetric cryptosystem would suffer from several problems in practical use, in particular, under the network environment such as key distribution and management.7, 8 Asymmetric scheme is the solution. In this paper, we design a novel asymmetric optical encryption system, in which two different types of decryption keys are particularly involved, named universal key Ku, and special key Ks respectively. The decryption keys differ from the encryption key. Each decryption key has its own function and applicable region in the process of decryption. One universal key corresponds to one encryption key (Ke). Ku can be used to decrypt any ciphertext encoded by Ke, but with poor legibility. On the contrary, Ks is adequate for legible decryption but only valid for one ciphertext corresponding to the specified plaintext. Now let us discuss the detail about this asymmetric cryptosystem. Phase-truncated Fourier transform (PTFT), which is proposed in our earlier work for the construction of optical asymmetric cryptosystem,9 is used again here to build a multifunctional scheme. PTFT is a process of Fourier transform with an operation of phase truncation, which means only the amplitude (modular part) of Fourier spectrum is retained, while the phase part of the spectrum is truncated. For the sake of simplicity, one-dimensional notation is used to illustrate this concept. Let f(x) denote the image to be encoded, FT( · ) the operator of Fourier transform, PT( · ) the operator of phase truncation, and PR( · ) the operator of phase reservation. Given a Fourier transformation F(u) = FT[f(x)] = |F(u)|exp [i2πφ(u)], the phase truncation and the phase reservation can be respectively expressed as follows: Eq. 1[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} {\rm PT}\left[ {F\left( u \right)} \right] = \left| {F\left( u \right)} \right|, \end{equation}\end{document}Eq. 2[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} {\rm PR}\left[ {F\left( u \right)} \right] = \exp \left[ {i2\pi \varphi \left( u \right)} \right]. \end{equation}\end{document}By implementing the phase-truncated Fourier transform, one can encrypt a plaintext into a noise-like cipher. The encryption process is illustrated in Fig. 1. Let P1 denote an image plaintext and C1 the corresponding ciphertext. The encoded image C1 can be obtained by the following equation: Eq. 3[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{eqnarray} C_1 \left( u \right) = {\rm PT}\left\{ {{\rm FT}\left[ {P_1 \left( x \right) \cdot K_e \left( x \right)} \right]} \right\}. \end{eqnarray}\end{document}Eq. 4[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} K_u \left( u \right) = {\rm PR}\left\{ {{\rm FT}\left[ {K_e \left( x \right)} \right]} \right\}. \end{equation}\end{document}Eq. 5[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} K_s \left( u \right) = {\rm PR}\left\{ {{\rm FT}\left[ {P_1 \left( x \right) \cdot K_e \left( x \right)} \right]} \right\}. \end{equation}\end{document}Eq. 6[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} P_1 \left( x \right) = {\rm PT}\left\{ {{\rm IFT}\left[ {C_1 \left( u \right) \cdot K_s \left( u \right)} \right]} \right\}, \end{equation}\end{document}Eq. 7[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{eqnarray} P_1 ^\prime \left( x \right) &=& {\rm PT}\left\{ {{\rm IFT}\left[ {C_1 \left( u \right) \cdot K_u \left( u \right)} \right]} \right\}\nonumber \\ &=& {\rm PT}\left( {{\rm IFT}\left\{ {FT\left[ {P_1 \left( x \right) \cdot K_e \left( x \right)} \right] \cdot B\left( u \right)} \right\}} \right), \end{eqnarray}\end{document}
[TeX:]
\documentclass[12pt]{minimal}\begin{document}\begin{eqnarray*}
B\left( u \right) = \frac{{K_s \left( u \right)}}{{K_u \left( u \right)}} = \frac{{{\rm PR}\left\{ {{\rm FT}\left[ {K_e \left( x \right)} \right]} \right\}}}{{{\rm PR}\left\{ {{\rm FT}\left[ {P_1 \left( x \right)} \right] \otimes {\rm FT}\left[ {K_e \left( x \right)} \right]} \right\}}}
\end{eqnarray*}\end{document}
where ⊗ means convolution. If the plain image has only low frequency content, FT(P1(x)) will be narrow and B(u) will be close to 1, leading to a good decryption. Therefore, the blurring degree of the decryption result depends on the frequency content of the plaintext. It should be noted that the proposed encryption strategy is only suitable for phase-only keys and real-value plaintexts. If either of them is complex-valued, the decryption function [Eq. 6] will be invalid.
Now we perform a proof-of-concept study with the aid of computer simulation in the environment of MATLAB. Consider images P1 (Lena, 256×256 pixels) and P2 (Baboon, 256×256 pixels) as two plaintexts. The ciphertexts, obtained with PTFT strategy, are two noise-like images, C1 and C2 (they are not shown here for saving space). The encryption key Ke is a random phase mask with the same size as the plaintexts. By using Eq. 4, we can obtain the universal decryption key Ku. Two special decryption keys, Ks1 and Ks2, corresponding to plaintexts, P1 and P2, respectively, are generated in each encryption process, according to Eq. 5. Now let us verify the effectiveness of decryption using the universal key and the special keys, respectively. When the special key Ks1 corresponding to the first plaintext P1 was used to decrypt C1, the Lena image can be clearly recovered, as shown in Fig. 2, whereas when Ks1 was used to decrypt C2, Baboon cannot be retrieved, as shown in Fig. 2. Similarly, the special key Ks2 corresponding to plaintexts P2 also can only be used to effectively decode C2 [see Fig. 2], and cannot be used to recover Lena [see Fig. 2]. These results proved that special keys are only legal for decryptions of the specified ciphertexts. With the right special key, it is lossless to decode the specified cipher but incapable of decoding others. In another case, when the universal key is used in the process of decryptions, both P1 and P2 can be approximately retrieved although being corrupted by noise, as shown in Figs. 2, 2. The computer simulation results demonstrate that the proposed optical cryptosystem can possess two independent decryption keys. This is quite a different case from that in traditional cryptology. This unique property of the proposed approach may allow the PTFT-based scheme to be used for envisaged application cases. As an example, case 1 would be to secure communications of simple messages (such as binary letters) between the members of a large group. In this case, the decryption effect of a universal key is adequate for the identification of plain messages. Thus, the PTFT scheme could serve as an ordinary asymmetric cryptosystem, regardless of the existence of special keys. As another example, case 2 would be high-security-level communication of delicate messages between two nodes in a network. In this case, the universal key would be irrelevant for the process of decryption, whereas the special key could be used to retrieve the messages precisely. Meanwhile, the security level could be guaranteed in virtue of the one-time pad manner. Some other possible cases may include setting up the security levels for different users, identification and authentication with different security levels, etc. AcknowledgmentsThis work is supported by the National Natural Science Foundation of China (Grant Nos. 60775021 and 60777008), IIFSDU (Grant No. 2010TB019), NIH ( SC COBRE P20RR021949 and Career Award 1k25hl088262-01), and NSF ( MRI CBET-0923311 and SC EPSCoR RII EPS-0903795). ReferencesB. Javidi,
“Securing information with optical technologies,”
Physics Today, 50 27
–32
(1997). https://doi.org/10.1063/1.881691 Google Scholar
P. Refregier and B. Javidi,
“Optical image encryption based on input plane and Fourier plane random encoding,”
Opt. Lett., 20 767
–769
(1995). https://doi.org/10.1364/OL.20.000767 Google Scholar
T. Nomura and B. Javidi,
“Optical encryption using a joint transform correlator architecture,”
Opt. Eng., 39 2031
–2035
(2000). https://doi.org/10.1117/1.1304844 Google Scholar
A. Carnicer, M. Montes–Usategui, S. Arcos, and I. Juvells,
“Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,”
Opt. Lett., 30 1644
–1646
(2005). https://doi.org/10.1364/OL.30.001644 Google Scholar
X. Peng, H. Wei, and P. Zhang,
“Known-plaintext attack on optical encryption based on double random phase keys,”
Opt. Lett., 31 1044
–1046
(2006). https://doi.org/10.1364/OL.31.001044 Google Scholar
W. Qin and X. Peng,
“Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,”
J. Opt. A: Pure Appl. Opt., 11 075402
(2009). https://doi.org/10.1088/1464-4258/11/7/075402 Google Scholar
G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang,
“Public-key-based optical image cryptosystem with data embedding techniques,”
Opt. Eng., 42 2331
–2339
(2003). https://doi.org/10.1117/1.1588660 Google Scholar
X. Peng, H. Wei, and P. Zhang,
“Asymmetric cryptography based on wavefront sensing,”
Opt. Lett., 31 3579
–3581
(2006). https://doi.org/10.1364/OL.31.003579 Google Scholar
W. Qin and X. Peng,
“Asymmetric cryptosystem based on phase-truncated Fourier transforms,”
Opt. Lett., 35 118
–120
(2010). https://doi.org/10.1364/OL.35.000118 Google Scholar
|