OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 52, Iss. 25 — Sep. 1, 2013
  • pp: 6213–6219

Optical Hash function based on two-beam interference

Hongji Lai, Wenqi He, and Xiang Peng  »View Author Affiliations


Applied Optics, Vol. 52, Issue 25, pp. 6213-6219 (2013)
http://dx.doi.org/10.1364/AO.52.006213


View Full Text Article

Enhanced HTML    Acrobat PDF (883 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

An approach for constructing an optical Hash function, also known as a one-way cryptosystem, based on two-beam interference (OHF-TBI) is proposed. The purpose of this method is creating the “digital fingerprint” of any precoding message with arbitrary length. This approach consists of three steps, in which the main step is a one-way processing procedure with a compression mechanism. To achieve the function of one-way property and compressibility, we designed a cascaded process on the basis of the two-beam interference principle and phase-truncation operation. The performance of the mentioned OHF-TBI is verified by theoretical analysis and a set of numerical simulations.

© 2013 Optical Society of America

OCIS Codes
(050.1940) Diffraction and gratings : Diffraction
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(070.4560) Fourier optics and signal processing : Data processing by optical means
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: May 22, 2013
Revised Manuscript: July 19, 2013
Manuscript Accepted: July 30, 2013
Published: August 23, 2013

Citation
Hongji Lai, Wenqi He, and Xiang Peng, "Optical Hash function based on two-beam interference," Appl. Opt. 52, 6213-6219 (2013)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-52-25-6213


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. B. Schneier and P. Sutherland, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, 1995).
  2. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  3. O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999). [CrossRef]
  4. J. W. Han and C. S. Park, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999). [CrossRef]
  5. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  6. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011). [CrossRef]
  7. L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078–3084 (2004). [CrossRef]
  8. B. Javidi and J. L. Horner, “Optical-pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994). [CrossRef]
  9. B. Javidi and A. Sergent, “Fully phase encoded key and biometrics for security verification,” Opt. Eng. 36, 935–942 (1997). [CrossRef]
  10. D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40, 1584–1589 (2001). [CrossRef]
  11. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef]
  12. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006). [CrossRef]
  13. X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006). [CrossRef]
  14. X. Peng, P. Zhang, H. Z. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  15. X. Peng, H. Z. Wei, and P. Zhang, “Chosen plaintext attack on double random-phase encoding in the Fresnel domain,” Acta Phys. Sin. 56, 3924–3930 (2007).
  16. J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283, 3917–3921 (2010). [CrossRef]
  17. W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50, 028201 (2011). [CrossRef]
  18. P. Kumar, J. Joseph, and K. Singh, “Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack,” J. Opt. 14, 045401 (2012). [CrossRef]
  19. X. Peng, P. Zhang, and L. L. Cai, “Information security system based on virtual-optics imaging methodology and public key infrastructure,” Optik 115, 420–426 (2004). [CrossRef]
  20. S. Yuan, X. Zhou, M. S. Alam, X. Lu, and X.-F. Li, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270–3284 (2009). [CrossRef]
  21. X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” Pure Appl. Opt. 11, 085402 (2009). [CrossRef]
  22. X. Peng, H. Wei, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006). [CrossRef]
  23. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010). [CrossRef]
  24. W. He, X. Peng, W. Qin, and X. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283, 2328–2332 (2010). [CrossRef]
  25. R. L. Rivest, “The MD5 message digest algorithm,” (1992).
  26. Y. Wang, X. F. Liao, D. Xiao, and K. W. Wong, “One-way Hash function construction based on 2D coupled map lattices,” Inform. Sci. 178, 1391–1406 (2008). [CrossRef]
  27. D. Xiao, X. F. Liao, and Y. Wang, “Parallel keyed Hash function construction based on chaotic neural network,” Neurocomputing 72, 2288–2296 (2009). [CrossRef]
  28. A. Kanso, H. Yahyaoui, and M. Almull, “Keyed Hash function based on a chaotic map,” Inform. Sci. 186, 249–264 (2012). [CrossRef]
  29. A. Kanso and M. Ghebleh, “A fast and efficient chaos-based keyed Hash function,” Commun. Nonlinear Sci. Numer. Simul. 18, 109–123 (2013). [CrossRef]
  30. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009). [CrossRef]
  31. J. W. Goodman, Introduction to Fourier Optics, 3rd ed. (Roberts & Company, 2005).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited