OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 51, Iss. 32 — Nov. 10, 2012
  • pp: 7750–7757

Optical hierarchical authentication based on interference and hash function

Wenqi He, Xiang Peng, Xiangfeng Meng, and Xiaoli Liu  »View Author Affiliations


Applied Optics, Vol. 51, Issue 32, pp. 7750-7757 (2012)
http://dx.doi.org/10.1364/AO.51.007750


View Full Text Article

Enhanced HTML    Acrobat PDF (1322 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We propose a method to achieve the purpose of hierarchical authentication on the basis of two beams’ interference and the one-way hash function. For this security protection system, only if the “phase key” and the password-controlled “phase lock” of a user are verified simultaneously can one obtain a permission to visit the confidential resources of the system. Moreover, this scheme can not only check the legality of the users but also verify their identity levels so as to grant them corresponding hierarchical access permissions. The authentication process is straightforward; the phase key and the password-controlled phase lock of one user are loading on two spatial light modulators in advance, by which two coherent beams are modulated and then interfere with each other at the output plane leading to an output image. By comparing the output image with all the standard certification images in the database, the system can thus verify the user’s identity. However, the system designing process involves an iterative modified phase retrieval algorithm. For an authorized user, a phase lock is first created based on a “digital fingerprint,” which is the result of a hash function on a preselected user password. The corresponding phase key can then be determined by use of the phase lock and a designated standard certification image. Theoretical analysis and computer simulations both validate the effectiveness of our method.

© 2012 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(220.4830) Optical design and fabrication : Systems design
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Optical Design and Fabrication

History
Original Manuscript: August 22, 2012
Revised Manuscript: October 2, 2012
Manuscript Accepted: October 9, 2012
Published: November 5, 2012

Citation
Wenqi He, Xiang Peng, Xiangfeng Meng, and Xiaoli Liu, "Optical hierarchical authentication based on interference and hash function," Appl. Opt. 51, 7750-7757 (2012)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-51-32-7750


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001). [CrossRef]
  3. P. C. Mogensen, R. L. Eriksen, and J. Gluckstad, “High capacity optical encryption system using ferro-electric spatial light modulators,” J. Opt. A 3, 10–15 (2001). [CrossRef]
  4. X. Peng, Z. Y. Cui, and T. N. Tan, “Information encryption with virtual-optics imaging system,” Opt. Commun. 212, 235–245 (2002). [CrossRef]
  5. G. H. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef]
  6. J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Multiplexing encrypted data by using polarized light,” Opt. Commun. 260, 109–112 (2006). [CrossRef]
  7. L. F. Chen and D. M. Zhao, “Optical image encryption with Hartley transforms,” Opt. Lett. 31, 3438–3440 (2006). [CrossRef]
  8. N. Zhou, Y. Wang, and L. Gong, “Novel optical image encryption scheme based on fractional Mellin transform,” Opt. Commun. 284, 3234–3242 (2011). [CrossRef]
  9. W. Q. He, X. Peng, W. Qin, and X. F. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283, 2328–2332 (2010). [CrossRef]
  10. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-ciphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef]
  11. X. Peng, H. Z. Wei, and P. Zhang, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  12. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007). [CrossRef]
  13. G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257–5262 (2007). [CrossRef]
  14. H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781(2010). [CrossRef]
  15. X. F. Meng, L. Z. Cai, and Y. R. Wang, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A 9, 1070–1075 (2007). [CrossRef]
  16. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  17. B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282, 3439–3443 (2009). [CrossRef]
  18. N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009). [CrossRef]
  19. Y. J. Han and Y. H. Zhang, “Optical image encryption based on two beams’ interference,” Opt. Commun. 283, 1690–1692 (2010). [CrossRef]
  20. C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010). [CrossRef]
  21. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011). [CrossRef]
  22. D. D. Weng, N. Zhu, Y. T. Wang, J. H. Xie, and J. A. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487(2011). [CrossRef]
  23. B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011). [CrossRef]
  24. S. Yuan, S. X. Yao, Y. H. Xin, and M. T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011). [CrossRef]
  25. W. Q. He, X. Peng, and X. F. Meng, “Optical multiple-image hiding based on interference and grating modulation,” J. Opt. 14, 075401 (2012). [CrossRef]
  26. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. (Wiley, 1996).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited