Advanced
Key Phase Mask Updating Scheme with Spatial Light Modulator for Secure Double Random Phase Encryption
Key Phase Mask Updating Scheme with Spatial Light Modulator for Secure Double Random Phase Encryption
Journal of information and communication convergence engineering. 2015. Dec, 13(4): 280-285
Copyright © 2015, The Korean Institute of Information and Commucation Engineering
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • Received : September 21, 2015
  • Accepted : October 20, 2015
  • Published : December 31, 2015
Download
PDF
e-PUB
PubReader
PPT
Export by style
Article
Author
Metrics
Cited by
TagCloud
About the Authors
Seok-Chul Kwon
Next Generation and Standards Division, Communication and Devices Group, Intel Corporation, Santa Clara, CA 95054, USA
In-Ho Lee
Department of Electrical, Electronic and Control Engineering, Hankyong National University, Anseong 17579, Korea
ihlee@hknu.ac.kr

Abstract
Double random phase encryption (DRPE) is one of the well-known optical encryption techniques, and many techniques with DRPE have been developed for information security. However, most of these techniques may not solve the fundamental security problem caused by using fixed phase masks for DRPE. Therefore, in this paper, we propose a key phase mask updating scheme for DRPE to improve its security, where a spatial light modulator (SLM) is used to implement key phase mask updating. In the proposed scheme, updated key data are obtained by using previous image data and the first phase mask used in encryption. The SLM with the updated key is used as the second phase mask for encryption. We provide a detailed description of the method of encryption and decryption for a DRPE system using the proposed key updating scheme, and simulation results are also shown to verify that the proposed key updating scheme can enhance the security of the original DRPE.
Keywords
I. INTRODUCTION
A number of optical encryption techniques have been developed for information security [1 - 20] . One of the most well-known optical encryption techniques is double random phase encryption (DRPE), which adopts random phase encoding in the input and the Fourier planes [1] . In DRPE, two physical phase masks are used for random phase encoding and are keys for correct decryption. Since the physical phase masks are not modifiable, DRPE can be insecure [2] . Thus, various techniques for enhancement of security with DRPE have been developed, including the following: DRPE in the Fresnel domain [3] , photon-counting DRPE [4 , 5] , DRPE using fractional Fourier transformation [6 - 8] , DRPE using orthogonal encoding [9] , and DRPE using accumulation encoding [10] .
In order to improve the security of DRPE, photon-counting DRPE generates a sparse encrypted image with a limited number of photons, while DRPE using the Fresnel domain or fractional Fourier transformation employs more complex keys than the original DRPE, and DRPE using orthogonal encoding or accumulation encoding performs additional encoding for encrypted images from the original DRPE. However, the fundamental security problem of using fixed phase masks may be effectively solved by updating the phase masks, rather than using additional schemes for the DRPE. Therefore, in this paper, we propose a key phase mask updating scheme for DRPE, in which a spatial light modulator (SLM) is used to implement key phase mask updating. In the proposed scheme, only the second phase mask is updated with the SLM, and the input data of the SLM (i.e., the updated key data) are the amplitudes of the data that are obtained by Fourier transform after multiplying previous image data by the first phase mask. Thus, the proposed scheme requires only information from a previous image and the first phase mask to update the key phase mask, and hence it can be considered a simple key updating scheme. In this paper, we provide a detailed method for encryption and decryption of a DRPE system with the proposed key updating scheme, and also report simulation results to verify the security of DRPE with the proposed scheme.
The paper is organized as follows: in Section II, the original DRPE concept is introduced. In Section III, the key phase mask updating scheme for a DRPE system is described. In Section IV, simulation results for the proposed key updating scheme are provided to verify its security. In Section V, we conclude the paper.
II. DOUBLE RANDOM PHASEENCRYPTION CONCEPT
Encryption and decryption for the original DRPE proposed in [1] are described in Fig. 1 (a) and (b), respectively. Without loss of generality, we assume one-dimensional data only. For encryption of DRPE, the primary data p ( x ) are multiplied by the first random phase mask exp{ i 2 πns ( x )} in the spatial domain, where ns ( x ) denotes the random phase that is uniformly distributed over [0,1]. Then, { p ( x )exp{ i 2 πns ( x )}} is obtained by passing through the first lens with the focal length f , where {‧} represents the Fourier transform. It is multiplied by the second random phase mask exp{ i 2 π rf ( w )} in the spatial frequency domain, where rf ( w ) denotes the uniformly distributed random phase between 0 and 1. Finally, by passing through the second lens with a focal length f , the encrypted data e ( x ) are obtained as in [4] :
PPT Slide
Lager Image
where -1 {‧} is the inverse Fourier transform.
PPT Slide
Lager Image
Schematic setup of (a) encryption and (b) decryption for DRPE.
For decryption of DRPE, the encrypted data e ( x ) pass through the first lens with a focal length f , and thus { e ( x )} is obtained. It is then multiplied by the complex-conjugate random phase mask exp{- i 2 πrf ( w )} to decode the encoded data by the second random phase mask. Finally, by passing through the second lens with a focal length f , the decrypted data d ( x ) are obtained as in [4] :
PPT Slide
Lager Image
III. KEY PHASE MASK UPDATING SCHEME FOR DRPE SYSTEM
Fig. 2 (a) depicts the encryption of the key phase mask updating scheme for a DRPE system. We assume that for encryption the initial key rin ( x ) is used until the k th primary image pk ( x ), and an updated key rup ( w ) is used from the ( k +1) th primary image p k +1 ( x ). As shown in Fig. 2 (a), only the second phase mask is considered for updating because it is used for both encryption and decryption, whereas the first phase mask exp{ i 2 π ns ( x )} is used only for encryption. Thus, the first phase mask is regarded as a physical key phase mask (i.e., a fixed phase mask). SLM is employed as the second phase mask in order to implement updatable key data. The initial key data rin ( w ), which are the input of SLM, are generated with uniform distribution over [0,1] and electronically synthesized. Hence, the second phase mask for the initial key is yielded as exp{ i 2 π rin ( w )}. Meanwhile, in order to update the key data for encrypting the ( k +1) th primary image, the k th primary data are multiplied by the first phase mask and passed through the lens. Then, the amplitudes of the resultant data are used as the updated key data, i.e., rup ( w )=| { pk ( x )exp{ i 2 π ns ( x )}}|. The phases of SLM are determined by using the updated key data. Therefore, by SLM the second phase mask for the updated key is generated as exp{ i 2 π rup ( w )}. Accordingly, the key data for the second phase mask can be frequently updated by using previous primary data and the first phase mask.
PPT Slide
Lager Image
Key phase mask updating scheme for a DRPE system: (a) encryption and (b) decryption.
Fig. 2 (b) shows the decryption of the key phase mask updating scheme for a DRPE system. We assume that complete initial key data are known for decryption. As seen in Fig. 2 (b), the complex-conjugate phase mask exp{- i 2 π rin ( w )} is obtained by SLM using the known initial key data, and then using the phase mask, the k th encrypted data ek ( x ) are perfectly decrypted. To update the key data in decryption, the k th decrypted data
PPT Slide
Lager Image
are multiplied by the first phase mask, and they pass through the lens. Thus, from the resultant data, the updated key data are obtained as
PPT Slide
Lager Image
Analogous to Fig. 2 (a), the updated key data are used as the phase information of SLM, and then SLM with the updated phases produces the complex conjugate of the second phase mask
PPT Slide
Lager Image
to decrypt the ( k +1) th encrypted data e k +1 ( x ).
As shown in Fig. 2 , the proposed scheme requires only information on the previous image and the first phase mask to update the key phase mask in both encryption and decryption. Therefore, it can be considered a simple key updating scheme. In addition, the proposed scheme fully utilizes two phase masks in both encryption and decryption unlike the original DRPE, in which the first phase mask is not used in decryption. In this paper, in order to focus on security performance evaluation of the proposed scheme, we only consider that the previous image is perfectly decrypted by assuming perfect initial key data in decryption. We also assume that there is no modulation error in SLM, and the size of the phase mask and SLM is the same because a DRPE system with a unity magnification ratio is considered.
IV. SIMULATION RESULTS
For simulation of a DRPE system with the key phase mask updating scheme, we consider two primary images with 500(H)×500(V) pixels, as shown in Fig. 3 . The first primary image in Fig. 3 (a) is encrypted through DRPE using the initial key in Fig. 4 (a), and then the second primary image in Fig. 3 (b) is encrypted through DRPE using the updated key in Fig. 4 (b). The initial key data in Fig. 4 (a) are randomly generated with uniform distribution over [0,1] and correspond to rin ( x ) in Fig. 2 (a), whereas the updated key data in Fig. 4 (b) are obtained as the amplitudes of data generated by Fourier transform after multiplying the first primary data by the first phase mask that is randomly made, which mean rup ( w ) in Fig. 2 (a). Fig 4 (c) and (d) show encrypted images by DRPE using the initial key and the updated key, respectively.
PPT Slide
Lager Image
1st and 2nd primary images.
PPT Slide
Lager Image
Simulation results of a DRPE system with the key phase mask updating scheme: (a) initial key data, (b) updated key data, (c) 1st encrypted image, and (d) 2nd encrypted image.
Fig. 5 (a) and (b) show correctly decrypted images by DRPE with the key phase mask updating scheme. By assuming that the initial key is perfectly known for decryption, the first encrypted image in Fig. 4 (c) is completely decrypted, as seen in Fig. 5 (a). The updated key data are then obtained by using the first decrypted image and the known first phase mask as in Fig. 2 (b), which are the same as Fig. 4 (b). With the updated key, the second encrypted image is correctly decrypted, and the second primary image is clearly obtained, as shown in Fig. 5 (b).
PPT Slide
Lager Image
Simulation results of correct decryption of a DRPE system with the key phase mask updating scheme: (a) 1st decrypted image and (b) 2nd decrypted image.
Fig. 6 (a) and (b) show simulation results of decryption for a DRPE system with the key phase mask updating scheme when only the initial key is used for decryption. The first decrypted image in Fig. 6 (a) is correct because the known initial key is used for decryption of DRPE. However, the second decrypted image in Fig. 6 (b) is incorrect and entirely unrecognizable since the key is not updated and the initial key is used to decrypt the second encrypted image, i.e., =
PPT Slide
Lager Image
in Fig. 2 (b).
PPT Slide
Lager Image
Simulation results of decryption for a DRPE system with the key phase mask updating scheme when only initial key is used for decryption. (a) 1st decrypted image and (b) 2nd decrypted image.
Fig. 7 (a) shows the second decrypted image by DRPE with the key phase mask updating scheme when the first decrypted image is correct but the key is updated with an incorrect first phase mask in decryption. The wrong phase mask is randomly generated, and it does not match the first phase mask used in encryption. Fig. 7 (b) shows the updated key data that are obtained by using the wrong phase mask. As seen in Fig. 7 (a), although the first encrypted image is perfectly decrypted, the decryption of the second encrypted image fails if the first phase mask is wrong. From the simulation results in Figs. 6 (b) and 7 (a), we verify that the proposed key phase mask updating scheme can improve the security of the original DRPE.
PPT Slide
Lager Image
Simulation results of decryption for a DRPE system with the key phase mask updating scheme when the key is updated with a wrong first phase mask in decryption: (a) 2nd decrypted image and (b) incorrectly updated key data.
V. CONCLUSIONS
We propose a key phase mask updating scheme to enhance the security of a DRPE system, where SLM is used to update a key phase mask. In fact, we present the method of encryption and decryption in detail for a DRPE system using the proposed key updating scheme. From the simulation results, we also verify that the updated key data by the proposed scheme include randomness such as noise, and DRPE using the updated key is able to achieve the security enhancement. Moreover, as the proposed scheme only requires the information of a previous image and the first phase mask to update the key phase mask, it can be considered a simple and effective key updating scheme for DRPE systems.
BIO
Seok-Chul Kwon
earned his Ph.D. degree from Georgia Institute of Technology in Atlanta, Georgia, US in 2013. Before that, Dr. Kwon earned a M.Sc. degree from the University of Southern California in 2007; and a B.Sc. degree from Yonsei University, Seoul, South Korea in 2001.Dr. Kwon conducted postdoctoral research at the Wireless Devices and Systems Group, University of Southern California in 2014 to 2015, and is currently with Intel Corporation, in particular, the Next Generation and Standards Division in the Communication and Devices Group. He has been involved in several projects for organizations such as DARPA and the US Army Research Lab; and contributed to six mobile-station products for Motorola and Sprint, which were successfully brought to market. His current research interests are in 5G wireless system design; polarization diversity and multiplexing; body area networks such as wearable computing and in-vivo communications; wireless channel modeling and its applications; and network coding-aware channel assignment.
In-Ho Lee
earned B.S., M.S. and Ph.D. degrees in electrical engineering from Hanyang University, Ansan, Korea, in 2003, 2005 and 2008, respectively. He worked on LTE-Advanced standardization at Samsung Electronics from 2008 to 2010. He was a Post-Doctoral Fellow in the Department of Electrical Engineering, Hanyang University, Ansan, Korea, from April 2010 to March 2011. Since March 2011, he has been with the Department of Electrical, Electronic and Control Engineering, Hankyong National University, Anseong, Korea. His present research interests include optical encryption, image transmissions, wireless cooperative communications, and wireless multiple-input multiple-output communications.
References
Refregier P. , Javidi B. 1995 “Optical-image encryption based on input plane and Fourier plane random encoding,” Optics Letters 20 (7) 767 - 769    DOI : 10.1364/OL.20.000767
Frauel Y. , Castro A. , Naughton T. J. , Javidi B. 2007 “Resistance of the double random phase encryption against various attacks,” Optics Express 15 (16) 10253 - 10265    DOI : 10.1364/OE.15.010253
Matoba O. , Javidi B. 1999 “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Optics Letters 24 (11) 762 - 764    DOI : 10.1364/OL.24.000762
Perez-Cabre E. , Cho M. , Javidi B. 2011 “Information authentication using photon-counting double-random-phase encrypted images,” Optics Letters 36 (1) 22 - 24    DOI : 10.1364/OL.36.000022
Cho M. , Javidi B. 2013 “Three-dimensional photon counting double-random-phase encryption,” Optics Letters 38 (17) 3198 - 3201    DOI : 10.1364/OL.38.003198
Unnikrishnan G. , Joseph J. , Singh K. 2000 “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Optics Letters 25 (12) 887 - 889    DOI : 10.1364/OL.25.000887
Joshi M. , Chandrashakher , Singh K. 2007 “Color image encryption and decryption using fractional Fourier transform,” Optics Communications 279 (1) 35 - 42    DOI : 10.1016/j.optcom.2007.07.012
Joshi M. , Shakher C. , Singh K. 2010 “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Optics Communications 283 (12) 2496 - 2505    DOI : 10.1016/j.optcom.2010.02.024
Lee I. H. , Cho M. 2014 “Double random phase encryption using orthogonal encoding for multiple-image transmission,” Journal of the Optical Society of Korea 18 (3) 201 - 206    DOI : 10.3807/JOSK.2014.18.3.201
Lee I.H. 2014 “Accumulation encoding technique based on double random phase encryption for transmission of multiple images,” Journal of the Optical Society of Korea 18 (4) 401 - 405    DOI : 10.3807/JOSK.2014.18.4.401
Nomura T. , Javidi B. 2000 “Optical encryption system with a binary key code,” Applied Optics 39 (26) 4783 - 4787    DOI : 10.1364/AO.39.004783
Monaghan D. S. , Gopinathan U. , Naughton T. J. , Sheridan J. T. 2007 “Key-space analysis of double random phase encryption technique,” Applied Optics 46 (26) 6641 - 6647    DOI : 10.1364/AO.46.006641
Singh M. , Kumar A. , Singh K. 2008 “Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption,” Optics & Laser Technology 40 (4) 619 - 624    DOI : 10.1016/j.optlastec.2007.09.007
Sarkadi T. , Koppa P. 2012 “Quantitative security evaluation of optical encryption using hybrid phase- and amplitude-modulated keys,” Applied Optics 51 (6) 745 - 750    DOI : 10.1364/AO.51.000745
Tashima H. , Takeda M. , Suzuki H. , Obi T. , Yamaguchi M. , Ohyama N. 2010 “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Optics Express 18 (13) 13772 - 13781    DOI : 10.1364/OE.18.013772
Barrera J. F. , Henao R. , Tebaldi M. , Torroba R. , Bolognini N. 2006 “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Optics Communications 259 (2) 532 - 536    DOI : 10.1016/j.optcom.2005.09.027
Tan X. , Matoba O. , Okada-Shudo Y. , Ide M. , Shimura T. , Kuroda K. 2001 “Secure optical memory system with polarization encryption,” Applied Optics 40 (14) 2310 - 2315    DOI : 10.1364/AO.40.002310
Chen W. , Chen X. 2010 “Space-based optical image encryption,” Optics Express 18 (26) 27095 - 27104    DOI : 10.1364/OE.18.027095
Matoba O. , Nomura T. , Perez-Cabre E. , Millan M. S. , Javidi B. 2009 “Optical techniques for information security,” Proceedings of the IEEE 97 (6) 1128 - 1148    DOI : 10.1109/JPROC.2009.2018367
Jeon S. H. , Gil S. K. 2012 “Dual optical encryption for binary data and secret key using phase-shifting digital holography,” Journal of the Optical Society of Korea 16 (3) 263 - 269    DOI : 10.3807/JOSK.2012.16.3.263