Advanced Photonics Nexus, Volume. 3, Issue 5, 056002(2024)

Neuromorphic encryption: combining speckle correlography and event data for enhanced security Editors' Pick

Shuo Zhu1,2, Chutian Wang1, Jianqing Huang1,3, Pei Zhang1, Jing Han2、*, and Edmund Y. Lam1、*
Author Affiliations
  • 1The University of Hong Kong, Department of Electrical and Electronic Engineering, Hong Kong, China
  • 2Nanjing University of Science and Technology, School of Electronic and Optical Engineering, Nanjing, China
  • 3Shanghai Jiao Tong University, School of Mechanical Engineering, Key Lab of Education Ministry for Power Machinery and Engineering, Shanghai, China
  • show less
    Figures & Tables(9)
    Schematic illustration of the neuromorphic encryption and decryption processes.
    Neuromorphic encryption system. (a) The optical configuration. (b) An encrypted letter “N” is made with a diffuse metal surface, captured with frame-mode and a focusing lens. (c) An event camera is employed as the neuromorphic sensor to collect the encrypted data.
    Analysis of encryption-related data. (a) The accumulated speckle and corresponding retrieved autocorrelation and the final decrypted results in different scattering conditions are presented. (b) The normalized intensity of the dashed line in the accumulated speckle. (c) The normalized intensity of the dashed line in the retrieved autocorrelation.
    Simulation results. The virtual cyphertext of speckle patterns from intermediate processes is used for event-stream data generation. The accumulated speckles with encrypted events and decrypted images with the learning PR algorithm.
    Robustness test against cropping. Ciphertext with different cropping ratios are 1/16, 1/8, 1/4, and 1/2, respectively.
    Robustness test against noise. Ciphertext added zero-mean Gaussian white noise with variances of 0.01 and 0.02 and added salt and pepper noise with 0.01 and 0.02 noise densities.
    Experimental results. (a) Letter target “N.” (b) Letter target “L.” (c) Quick draw target “Tshirt.” (d) Quick draw target “Apple.” For each subfigure: the first column from the left is the ground truth plaintext; the first row is the collected encrypted events that have the same time period and different time periods; the second and third rows are the accumulated speckle and corresponding autocorrelation; the last row is the decrypted result via the learning PR algorithm.
    Comparison results of the traditional HIO PR algorithm with our learning method for event data decryption.
    Cracking resistance test with wrong time duration selection (in the red dash box). The correct process with a proper time duration selection is also presented in the green dash box.
    Tools

    Get Citation

    Copy Citation Text

    Shuo Zhu, Chutian Wang, Jianqing Huang, Pei Zhang, Jing Han, Edmund Y. Lam, "Neuromorphic encryption: combining speckle correlography and event data for enhanced security," Adv. Photon. Nexus 3, 056002 (2024)

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Research Articles

    Received: Mar. 27, 2024

    Accepted: Jun. 20, 2024

    Published Online: Jul. 19, 2024

    The Author Email: Han Jing (eohj@njust.edu.cn), Lam Edmund Y. (elam@eee.hku.hk)

    DOI:10.1117/1.APN.3.5.056002

    CSTR:32397.14.1.APN.3.5.056002

    Topics