Abstract

Research demonstrates that a Fresnel hologram can be generated and simultaneously encrypted numerically based on a secret symmetric key formed by the maximal length sequence (M-sequence). The method can be directly extended to encrypt a video holographic clip in a frame-by-frame manner. However, given the limited combination of signals in the family of M-sequence, hacking the secret key through trial and error can be time consuming but not difficult. In this letter, we propose a method that is difficult to crack with brute force for encrypting a holographic video sequence. An M-sequence is first randomly assigned to encrypt each frame of the holographic video signal. Subsequently, the index of the selected M-sequence, which is necessary to decrypt the hologram, is encrypted with the RSA algorithm before transmitting to the receiving end. At the receiving end, the decoder is provided with a private key to recover the index for each frame, and the corresponding M-sequence is used to decrypt the encoded hologram.

© 2013 Chinese Optics Letters

PDF Article

References

  • View by:
  • |
  • |
  • |

  1. Y.-H. Seo, H. J. Choi, and D. W. Kim, Opt. Commun. 282, 367 (2009).
  2. K. B. Doh, K. Dobson, T.-C. Poon, and P. S. Chung, Appl. Opt. 48, 134 (2009).
  3. J. Li, T. Zheng, Q.-Z. Liu, and R. Li, Opt. Commun. 285, 1704 (2012).
  4. Q. Guo, Z. Liu, and S. Liucora, Opt. Commun. 284, 3918 (2011).
  5. H. Hwang, H. Chang, and W. Lie, Opt. Express 17, 13700 (2009).
  6. G. Situ and J. Zhang, Opt. Lett. 29, 1584 (2004).
  7. S. Kishk and B. Javidi, Appl. Opt. 41, 5462 (2002).
  8. P. Tsang, W. Cheung, T. Poon, and C. Zhou, Opt. Express 19, 15205 (2011).
  9. T. Shimobaba, H. Nakayama, N. Masuda, and T. Ito, Opt. Express 19, 19504 (2010).
  10. P. W. M. Tsang, T.-C. Poon, and K. W. K. Cheung, Appl. Opt. 50, B46 (2011).
  11. S. W. Golomb, Shift Register Sequences (Aegean Park Press, California, 1981).
  12. R. L. Rivest, A. Shamir, and L. Adleman, Communication of the ACM 21, 120 (1978).
  13. "RFC 3447: Public-Key Cryptography Standards (PKCS)", http://rfc-ref.org/RFC-TEXTS/3447/chapter7.html#d4e442871.

2012 (1)

J. Li, T. Zheng, Q.-Z. Liu, and R. Li, Opt. Commun. 285, 1704 (2012).

2011 (3)

2010 (1)

T. Shimobaba, H. Nakayama, N. Masuda, and T. Ito, Opt. Express 19, 19504 (2010).

2009 (3)

2004 (1)

2002 (1)

1978 (1)

R. L. Rivest, A. Shamir, and L. Adleman, Communication of the ACM 21, 120 (1978).

Adleman, L.

R. L. Rivest, A. Shamir, and L. Adleman, Communication of the ACM 21, 120 (1978).

Chang, H.

Cheung, K. W. K.

Cheung, W.

Choi, H. J.

Y.-H. Seo, H. J. Choi, and D. W. Kim, Opt. Commun. 282, 367 (2009).

Chung, P. S.

Dobson, K.

Doh, K. B.

Guo, Q.

Q. Guo, Z. Liu, and S. Liucora, Opt. Commun. 284, 3918 (2011).

Hwang, H.

Ito, T.

T. Shimobaba, H. Nakayama, N. Masuda, and T. Ito, Opt. Express 19, 19504 (2010).

Javidi, B.

Kim, D. W.

Y.-H. Seo, H. J. Choi, and D. W. Kim, Opt. Commun. 282, 367 (2009).

Kishk, S.

Li, J.

J. Li, T. Zheng, Q.-Z. Liu, and R. Li, Opt. Commun. 285, 1704 (2012).

Li, R.

J. Li, T. Zheng, Q.-Z. Liu, and R. Li, Opt. Commun. 285, 1704 (2012).

Lie, W.

Liu, Q.-Z.

J. Li, T. Zheng, Q.-Z. Liu, and R. Li, Opt. Commun. 285, 1704 (2012).

Liu, Z.

Q. Guo, Z. Liu, and S. Liucora, Opt. Commun. 284, 3918 (2011).

Liucora, S.

Q. Guo, Z. Liu, and S. Liucora, Opt. Commun. 284, 3918 (2011).

Masuda, N.

T. Shimobaba, H. Nakayama, N. Masuda, and T. Ito, Opt. Express 19, 19504 (2010).

Nakayama, H.

T. Shimobaba, H. Nakayama, N. Masuda, and T. Ito, Opt. Express 19, 19504 (2010).

Poon, T.

Poon, T.-C.

Rivest, R. L.

R. L. Rivest, A. Shamir, and L. Adleman, Communication of the ACM 21, 120 (1978).

Seo, Y.-H.

Y.-H. Seo, H. J. Choi, and D. W. Kim, Opt. Commun. 282, 367 (2009).

Shamir, A.

R. L. Rivest, A. Shamir, and L. Adleman, Communication of the ACM 21, 120 (1978).

Shimobaba, T.

T. Shimobaba, H. Nakayama, N. Masuda, and T. Ito, Opt. Express 19, 19504 (2010).

Situ, G.

Tsang, P.

Tsang, P. W. M.

Zhang, J.

Zheng, T.

J. Li, T. Zheng, Q.-Z. Liu, and R. Li, Opt. Commun. 285, 1704 (2012).

Zhou, C.

Appl. Opt. (3)

Communication of the ACM (1)

R. L. Rivest, A. Shamir, and L. Adleman, Communication of the ACM 21, 120 (1978).

Opt. Commun. (3)

Y.-H. Seo, H. J. Choi, and D. W. Kim, Opt. Commun. 282, 367 (2009).

J. Li, T. Zheng, Q.-Z. Liu, and R. Li, Opt. Commun. 285, 1704 (2012).

Q. Guo, Z. Liu, and S. Liucora, Opt. Commun. 284, 3918 (2011).

Opt. Express (3)

Opt. Lett. (1)

Other (2)

S. W. Golomb, Shift Register Sequences (Aegean Park Press, California, 1981).

"RFC 3447: Public-Key Cryptography Standards (PKCS)", http://rfc-ref.org/RFC-TEXTS/3447/chapter7.html#d4e442871.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.