1. Interference-based multiple-image encryption and authentication via lateral shift multiplexing and sparsification.
- Author
-
Luan, Guangyu, Huang, Caojun, and Wang, Dongxin
- Subjects
MULTIPLEXING ,MULTI-factor authentication ,COMPUTER simulation ,SILHOUETTES ,KEY agreement protocols (Computer network protocols) - Abstract
We report a novel optical method of interference-based multiple-image encryption and authentication via lateral shift multiplexing and sparsification. We encode multiple original images into two ciphertexts only containing partial information of the multiple images when the secret key generated randomly is laterally movable within a predefined interval, and we analytically derive the two other keys of each original image. Information discrimination for each original image as well as its silhouette is still prohibited in spite of the utilization of one, two, three, or even four masks for decryption. The three secret keys of each original image significantly improve the security of the proposed method, and binary amplitude masks are included in the decryption and authentication procedure. Moreover, the proposed scheme completely eliminates the cross-talk problem and destroys any high correlation between the plaintexts and ciphertexts. Numerical simulations are executed to prove the effectiveness and security of this scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF