首页 | 本学科首页   官方微博 | 高级检索  
     

基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法
引用本文:潘雪梅,孟祥锋,杨修伦,王玉荣,彭翔,何文奇,董国艳,陈红艺. 基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法[J]. 物理学报, 2015, 64(11): 110701-110701. DOI: 10.7498/aps.64.110701
作者姓名:潘雪梅  孟祥锋  杨修伦  王玉荣  彭翔  何文奇  董国艳  陈红艺
作者单位:1. 山东大学信息科学与工程学院光学工程系, 山东省激光技术与应用重点实验室, 济南 250100;2. 深圳大学光电工程学院, 深圳 518060;3. 中国科学院大学材料科学与光电技术学院, 北京 100049;4. 深圳大学电子科学与技术学院, 深圳 518060
基金项目:国家自然科学基金(批准号:61275014,61307003,61171073,51102148,1110488)、山东省自然科学基金(批准号:ZR2011FQ011)、山东省科技计划项目(批准号:2011GGH20119)和山东省优秀中青年科学家科研奖励基金(批准号:BS2011DX023)资助的课题.
摘    要:结合相位恢复和像素行、列循环移动置乱技术, 本文提出了一种基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法, 通过菲涅耳域的相位恢复算法, 依次恢复并生成多幅图像各自所对应的输入平面的复振幅信息, 通过各自的行、列向量随机数对原始二值振幅模板进行行、列循环移动置乱操作来获得每幅图像的采样模板, 认证系统将多个复振幅场信息采样、叠加并空间复用, 同时, 行向量随机数和列向量随机数被RSA算法公钥编码成密文. 系统认证时, 认证方利用自己持有的私钥将密文解码成行向量随机数和列向量随机数, 通过行、列循环移动置乱变换后获得各自的采样模板, 合成的复振幅信息和采样模板等认证信息均放置在各自正确位置, 当认证系统被正确波长的平面波照射时, 在输出平面能获得输出图像, 通过计算、显示输出图像和对应认证图像的非线性相关系数峰值来判断认证是否成功.

关 键 词:安全认证  相位恢复  数字图像处理
收稿时间:2014-08-21

Asymetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm
Pan Xue-Mei,Meng Xiang-Feng,Yang Xiu-Lun,Wang Yu-Rong,Peng Xiang,He Wen-Qi,Dong Guo-Yan,Chen Hong-Yi. Asymetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm[J]. Acta Physica Sinica, 2015, 64(11): 110701-110701. DOI: 10.7498/aps.64.110701
Authors:Pan Xue-Mei  Meng Xiang-Feng  Yang Xiu-Lun  Wang Yu-Rong  Peng Xiang  He Wen-Qi  Dong Guo-Yan  Chen Hong-Yi
Affiliation:1. Department of Optics, School of Information Science and Engineering and Shandong Provincial Key Laboratory of Laser Technology and Application, Shandong University, Jinan 250100, China;2. College of Optoelectronics Engineering, Shenzhen University, Shenzhen 518060, China;3. College of Materials Science and Opto-Electronic Technology, University of Chinese Academy of Sciences, Beijing 100049, China;4. College of Electronic Science and Technology, Shenzhen University, Shenzhen 518060, China
Abstract:By combining the iterative phase retrieval algorithm in the Fresnel domain with the shift rotation permutation operations of row vectors and column vectors, a new kind of asymmetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm is proposed, where multiple complex amplitude information in the input plane is retrieved and generated by the phase retrieval algorithm in the Fresnel domain. In original binary amplitude mask, the row vector and column vectors random numbers are randomly generated in advance, such that each sampling mask for each authenticator is obtained by the shift rotation permutation operations of corresponding row vector and column vectors random numbers for original binary amplitude mask. Thus, one synthesized complex amplitude is generated by the operations of sampling, overlap and multiplexing, and then sent to the certification center for authentication use. At the same time, the row vector and column vectors random numbers are encoded to ciphers by the public keys of RSA algorithm, and then delivered to the corresponding authenticators. During the authentication process, the row vector and column vectors random numbers are first decoded by the private keys possessed by the authenticator; second, the authenticator’s sampling mask is reconstructed by the shift rotation permutation operations of the above decoded random numbers for original binary amplitude mask. Finally, the authenticator with other additional authentication keys is prompted to place the synthesized complex amplitude information and its sampling mask at the corresponding positions, when the system is illuminated by a plane wave with the correct wavelength. A recovered image is then recorded in the output plane, by calculating and displaying the nonlinear correlation coefficient between the recovered image and the certification image, if there exists a remarkable peak in its nonlinear correlation coefficient distributions, indicating that the authentication is successful. On the contrary, if there is no remarkable peak but uniformly distributed white noise in the map, the authentication process is a failure attempt. Any intruder with randomly generated forged authentication keys will end up with a failure which enhances the security of the system to some extent.
Keywords:security authentication  phase retrieval  digital image processing
点击此处可从《物理学报》浏览原始摘要信息
点击此处可从《物理学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号