OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 51, Iss. 32 — Nov. 10, 2012
  • pp: 7750–7757

Optical hierarchical authentication based on interference and hash function

Wenqi He, Xiang Peng, Xiangfeng Meng, and Xiaoli Liu  »View Author Affiliations


Applied Optics, Vol. 51, Issue 32, pp. 7750-7757 (2012)
http://dx.doi.org/10.1364/AO.51.007750


View Full Text Article

Acrobat PDF (1322 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We propose a method to achieve the purpose of hierarchical authentication on the basis of two beams’ interference and the one-way hash function. For this security protection system, only if the “phase key” and the password-controlled “phase lock” of a user are verified simultaneously can one obtain a permission to visit the confidential resources of the system. Moreover, this scheme can not only check the legality of the users but also verify their identity levels so as to grant them corresponding hierarchical access permissions. The authentication process is straightforward; the phase key and the password-controlled phase lock of one user are loading on two spatial light modulators in advance, by which two coherent beams are modulated and then interfere with each other at the output plane leading to an output image. By comparing the output image with all the standard certification images in the database, the system can thus verify the user’s identity. However, the system designing process involves an iterative modified phase retrieval algorithm. For an authorized user, a phase lock is first created based on a “digital fingerprint,” which is the result of a hash function on a preselected user password. The corresponding phase key can then be determined by use of the phase lock and a designated standard certification image. Theoretical analysis and computer simulations both validate the effectiveness of our method.

© 2012 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(220.4830) Optical design and fabrication : Systems design
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Optical Design and Fabrication

History
Original Manuscript: August 22, 2012
Revised Manuscript: October 2, 2012
Manuscript Accepted: October 9, 2012
Published: November 5, 2012

Citation
Wenqi He, Xiang Peng, Xiangfeng Meng, and Xiaoli Liu, "Optical hierarchical authentication based on interference and hash function," Appl. Opt. 51, 7750-7757 (2012)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-51-32-7750

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Log in to access OSA Member Subscription

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Log in to access OSA Member Subscription

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Log in to access OSA Member Subscription

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited