Flexible optical encryption with multiple users and multiple security levels

نویسندگان

  • Naveen K. Nishchal
  • Thomas J. Naughton
چکیده

a r t i c l e i n f o Keywords: Optical image encryption Information security Fractional Fourier transform Three-dimensional image processing Digital holography We present a basic optical encryption architecture that admits several cryptography applications based on multiplexing. Users can decrypt different private images from the same encrypted image, a superuser can have a key that decrypts all encrypted images, and multiplexed images can be encrypted with different levels of security. This system is presented in the context of a general framework of optical encryption application development. We illustrate with a real-world three-dimensional scene, captured with digital holography, and encrypted using the fractional Fourier transform, where different users have access to different three-dimensional objects in the scene. Optical encryption has reached a level of maturity recently with the publication of realistic attacks [1–5] that exploit its inherent weakness of linearity. This serious security problem associated with repeated use of the same key can be defended against through the use of modes of encryption [6], which promise to make optical encryption a viable symmetric cryptosystem. The repeated cycle of publication of an attack followed by publication of an appropriate defense is the natural lifecycle of conventional cryptosystems. To encourage widespread use, the field of optical encryption should offer a cohesive and fully-featured suite of practical and unique applications. A single framework for the different applications will allow a single optical hardware arrangement to support this wide range of applications without modification. The aim of this communication is to illustrate one such framework and associated suite of applications. In the sister field of compression, data compression and image compression have distinct uses. Data compression is synonymous with lossless data compression and in image compression some loss and defects can be tolerated for vastly increased compression ratios and computational efficiency. Similarly, data encryption and image encryption have different motivations, and optical-based techniques are particularly suited for the latter. One unique property of image encryption is that it tolerates lossy multiplexing, which mitigates any disadvantages of optical encryption compared to electronic encryp-tion. The suite of encryption applications presented in this study is based on the concept of secure multiplexing [7] of optical images. In the scenario of a single encrypted image shared between multiple users each with their own private unique decryption key, we consider three user cases, where (i) each user decrypts a different private image, (ii) as before, but where …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Flexible Traitor Tracing for Anonymous Attacks

Copyrighted materials are divided into multiple segments and each segment has multiple variations that are differently watermarked and encrypted. The combination of watermark and encryption enables one to identify the actual users (traitors) who have engaged in the piracy. In this paper, we shall present a traitor tracing scheme that can efficiently and flexibly defend against anonymous attacks.

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010