Advanced Photonics Nexus, Volume. 3, Issue 5, 056016(2024)
Multiuser computational imaging encryption and authentication with OFDM-assisted key management
Fig. 1. Concept of the multiuser SPI security framework.
Fig. 2. Schematic of the Fourier SPI encryption. The host digitally processes
Fig. 3. Schematic of regional encryption. (a) Texture information and spacing distribution of pixels can be scrambled by whitening and permutation, whereas (b) permutation-only encryption still can reveal the content information.
Fig. 4. Flowchart for generating different whitening masks
Fig. 6. Design concept of OFDM-assisted key management. (a) Connecting role of key management between SPI encryption and multiple users. (b) Keys are separately processed by OFDM-like coding and RSA, zoned as the private channel and public channel, which are further physically confused by polarization and etched into the metasurface.
Fig. 7. Design principle of the OFDM-assisted key management. (a) Flowchart of OFDM-like coding. (b) Time-frequency diagram of
Fig. 8. Optical setup of the proposed scheme. (a) Setup of the multiuser SPI encryption framework and decryption mechanism. (b) Configuration of key distribution.
Fig. 9. Synergetic authentication mechanism. The red dashed box shows the retrieving process of
Fig. 10. Attacking results from a deep differential attack. G. T., D. V., and C. V. denote ground truth, the legal decrypted version, and cracked version, respectively. Ex. Att. and In. Att. mean the external and internal attacking results from Eve and internal user, respectively. The attack mode is only directed toward the pertinent stages of SPI encryption. The measures unrelated to encryption, such as steganography and holography, are assumed to be prior-known by default. SCU is the abbreviation of Sichuan University and is used with the permission of Sichuan University.
Fig. 11. Error tolerance analysis. (a) Recovered token display under the recognition errors occurring with different ratios. (b) BER performance of OFDM-like coding and the raw token.
Fig. 12. Numerical assessment of bucket signal
|
Get Citation
Copy Citation Text
Hongran Zeng, Ping Lu, Xiaowei Li, Lingling Huang, Chaoyun Song, Dahai Li, In-kwon Lee, Seok-Tae Kim, Qiong-Hua Wang, Yiguang Liu, "Multiuser computational imaging encryption and authentication with OFDM-assisted key management," Adv. Photon. Nexus 3, 056016 (2024)
Category: Research Articles
Received: Jun. 1, 2024
Accepted: Aug. 1, 2024
Published Online: Aug. 29, 2024
The Author Email: Xiaowei Li (xwli@scu.edu.cn), Qiong-Hua Wang (qionghua@buaa.edu.cn), Yiguang Liu (liuyg@scu.edu.cn)