Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Identity authentication based on two-beam interference and nonlinear correlation

He Jiang-Tao He Wen-Qi Liao Mei-Hua Lu Da-Jiang Peng Xiang

Citation:

Identity authentication based on two-beam interference and nonlinear correlation

He Jiang-Tao, He Wen-Qi, Liao Mei-Hua, Lu Da-Jiang, Peng Xiang
PDF
Get Citation

(PLEASE TRANSLATE TO ENGLISH

BY GOOGLE TRANSLATE IF NEEDED.)

  • In this paper, a new approach to identity authentication is proposed, which takes advantage of the two-beam interference setup and the nonlinear correlation technique. According to the traditional two-beam interference encryption/decryption structure, we design a modified iterative phase retrieval algorithm (MIPRA), which takes the random binary amplitudes as the constraints at the input plane to encode different images (standard reference images) into a set of sparse phase distributions. In the MIPRA, a given random phase distribution serves as a system lock, and it is placed at one of the arms of the two-beam interference setup and keeps unchanged in the whole iterative phase retrieval algorithm but equivalently provides a fixed shifting vector toward the output complex amplitude field. While the peak-to-correlation value (between the output intensity and the original image) reaches a presetting threshold value, or the iterative numer of time reaches a presetting maximum value, the MIPRA stops. Here, the phase lock is assumed to be the same for all the users and thus it is placed and fixed in the system, while the calculated phase distributions vary from the MIPRA to different binary constraints, which are related to different users. Meanwhile, we also study an extension version of the proposed method. By using a superposition multiplexing technique and a nonlinear correlation technique, we can realize a function of hierarchical authentication for various kinds of users through a similar but more smart decision strategy. For example, we adopt the MIPRA four times with different constraints (random binary amplitude distribution) to obtain four phase distributions, the sum of them will be regarded as a final phase key and is designed to the user with the highest privilege. He is then able to pass all the authentication process for each standard reference image with his multiplexed phase key, that is to say, there are obvious peaks in all the nonlinear correlation maps between all the output images and the corresponding standard reference images. In a similar way, the user with the lowest privilege can only pass one authentication process. Compared with the previous identity authentication methods in the optical security area, the phase key for each user, no matter what level he belongs to, is easy to be stored and transmitted because its distinguishing feature of sparsity. It is worthwhile to note that the cross-talk between different output images are very low and will has no effect on the authentication decision since we deliberately assemble all the binary distributions, which act as constraints at the input plane in the MIPRA. Moreover, the output results are all noise-like distributions, which makes it nearly impossible for any potential intruders to find any clues of the original standard reference images. However, on the other hand, with the nonlinear correlation technique, we can easily extract enough information from these noise-like output results to authorize any users, usually we can obtain an obvious peak at the center of the correlation results but there is no peak if we adopt the traditional correlation algorithms. This feature helps reduce the risk of information leakage, thereby providing an additional protection layer. Also, weinvestigate the robustness properties by taking the sparsity ratio, Gaussian noise, and shear/occluded attack into consideration. Some previous tests alsoindicated that our scheme can resist the attack employing incorrect random phase keys. Theoretical analysis and a series simulation results are provided to verify the feasibility and effectiveness of the proposed scheme.
      Corresponding author: He Wen-Qi, he.wenqi@qq.com;xpeng@szu.edu.cn ; Peng Xiang, he.wenqi@qq.com;xpeng@szu.edu.cn
    • Funds: Project supported by the National Natural Science Foundation of China (Grant Nos.61377017,61307003),the Sino-German Center for Research Promotion (Grant No.GZ 760),the Natural Science Foundation of Shenzhen University,China (Grant No.2016028),and the Science and Technology Innovation Commission of Shenzhen,China (Grant No.JCYJ20160520164642478).
    [1]

    Refregier P, Javidi B 1995 Opt. Lett. 20 767

    [2]

    Situ G H, Zhang J J 2004 Opt. Lett. 29 1584

    [3]

    Peng X, Zhang P, Wei H Z, Yu B 2006 Acta Phys. Sin. 55 1130 (in Chinese)[彭翔, 张鹏, 位恒政, 于斌 2006 物理学报 55 1130]

    [4]

    Liu Z J, Guo Q, Xu L, Ahmad M A, Liu S T 2010 Opt. Express 18 12033

    [5]

    Qin W, Peng X 2010 Opt. Lett. 35 118

    [6]

    Zhang Y, Wang B 2008 Opt. Lett. 33 2443

    [7]

    Clemente P, Duran V, Torres-Company V, Tajahuerce E, Lancis J 2010 Opt. Lett. 35 2391

    [8]

    Pérez-Cabré E, Cho M, Javidi B 2011 Opt. Lett. 36 22

    [9]

    Shi Y S, Li T, Wang Y L, Gao Q K, Zhang S G, Li H F 2013 Opt. Lett. 38 1425

    [10]

    Zhou N R, Zhang A D, Zheng F, Gong L H 2014 Opt. Laser Technol. 62 152

    [11]

    Zhang Y, Wang B, Dong Z L 2009 J. Opt. A:Pure Appl. Opt. 11 125406

    [12]

    Kumar P, Joseph J, Singh K 2011 Appl. Opt. 50 1805

    [13]

    Niu C H, Wang X L, Lü N G, Zhou Z H, Li X Y 2010 Opt. Express 18 7827

    [14]

    Wang X G, Zhao D M 2012 Appl. Opt. 51 686

    [15]

    Javidi B, Horner J L 1994 Opt. Eng. 33 1752

    [16]

    Wang R K, Watson I A, Chatwin C 1996 Opt. Eng. 35 2464

    [17]

    He W Q, Peng X, Meng X F, Liu X L 2013 Acta. Phys. Sin. 62 064205 (in Chinese)[何文奇, 彭翔, 孟祥锋, 刘晓利 2013 物理学报 62 064205]

    [18]

    Liu W, Liu Z J, Liu S T 2015 Appl. Opt. 54 1802

    [19]

    Shi X Y, Chen Z Y, Zhao D M, Mao H D, Chen L F 2015 Appl. Opt. 54 3197

    [20]

    Chen W, Chen X D, Stern A, Javidi B 2013 IEEE Photon. J. 5 6900113

    [21]

    Gong Q, Liu X Y, Li G Q, Qin Y 2013 Appl. Opt. 52 7486

    [22]

    Chen W, Chen X D 2014 Opt. Commun. 318 128

    [23]

    Wang X G, Chen W, Chen X D 2015 IEEE Photon. J. 7 7800310

    [24]

    Pan X M, Meng X F, Yang X L, Wang Y R, Peng X, He W Q, Dong G Y, Chen H Y 2015 Acta. Phys. Sin. 64 110701 (in Chinese)[潘雪梅, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇, 董国艳, 陈红艺 2015 物理学报 64 110701]

    [25]

    Wang X G, Chen W, Mei S T, Chen X D 2015 Sci. Rep. 5 15668

    [26]

    Wang Q, Alfalou A, Brosseau C 2016 Opt. Commun. 372 144

    [27]

    Javidi B 1989 Appl. Opt. 28 2358

  • [1]

    Refregier P, Javidi B 1995 Opt. Lett. 20 767

    [2]

    Situ G H, Zhang J J 2004 Opt. Lett. 29 1584

    [3]

    Peng X, Zhang P, Wei H Z, Yu B 2006 Acta Phys. Sin. 55 1130 (in Chinese)[彭翔, 张鹏, 位恒政, 于斌 2006 物理学报 55 1130]

    [4]

    Liu Z J, Guo Q, Xu L, Ahmad M A, Liu S T 2010 Opt. Express 18 12033

    [5]

    Qin W, Peng X 2010 Opt. Lett. 35 118

    [6]

    Zhang Y, Wang B 2008 Opt. Lett. 33 2443

    [7]

    Clemente P, Duran V, Torres-Company V, Tajahuerce E, Lancis J 2010 Opt. Lett. 35 2391

    [8]

    Pérez-Cabré E, Cho M, Javidi B 2011 Opt. Lett. 36 22

    [9]

    Shi Y S, Li T, Wang Y L, Gao Q K, Zhang S G, Li H F 2013 Opt. Lett. 38 1425

    [10]

    Zhou N R, Zhang A D, Zheng F, Gong L H 2014 Opt. Laser Technol. 62 152

    [11]

    Zhang Y, Wang B, Dong Z L 2009 J. Opt. A:Pure Appl. Opt. 11 125406

    [12]

    Kumar P, Joseph J, Singh K 2011 Appl. Opt. 50 1805

    [13]

    Niu C H, Wang X L, Lü N G, Zhou Z H, Li X Y 2010 Opt. Express 18 7827

    [14]

    Wang X G, Zhao D M 2012 Appl. Opt. 51 686

    [15]

    Javidi B, Horner J L 1994 Opt. Eng. 33 1752

    [16]

    Wang R K, Watson I A, Chatwin C 1996 Opt. Eng. 35 2464

    [17]

    He W Q, Peng X, Meng X F, Liu X L 2013 Acta. Phys. Sin. 62 064205 (in Chinese)[何文奇, 彭翔, 孟祥锋, 刘晓利 2013 物理学报 62 064205]

    [18]

    Liu W, Liu Z J, Liu S T 2015 Appl. Opt. 54 1802

    [19]

    Shi X Y, Chen Z Y, Zhao D M, Mao H D, Chen L F 2015 Appl. Opt. 54 3197

    [20]

    Chen W, Chen X D, Stern A, Javidi B 2013 IEEE Photon. J. 5 6900113

    [21]

    Gong Q, Liu X Y, Li G Q, Qin Y 2013 Appl. Opt. 52 7486

    [22]

    Chen W, Chen X D 2014 Opt. Commun. 318 128

    [23]

    Wang X G, Chen W, Chen X D 2015 IEEE Photon. J. 7 7800310

    [24]

    Pan X M, Meng X F, Yang X L, Wang Y R, Peng X, He W Q, Dong G Y, Chen H Y 2015 Acta. Phys. Sin. 64 110701 (in Chinese)[潘雪梅, 孟祥锋, 杨修伦, 王玉荣, 彭翔, 何文奇, 董国艳, 陈红艺 2015 物理学报 64 110701]

    [25]

    Wang X G, Chen W, Mei S T, Chen X D 2015 Sci. Rep. 5 15668

    [26]

    Wang Q, Alfalou A, Brosseau C 2016 Opt. Commun. 372 144

    [27]

    Javidi B 1989 Appl. Opt. 28 2358

  • [1] Zhou Xian-Tao, Jiang Ying-Hua, Guo Xiao-Jun, Peng Zhan. Quantum secure direct communication scheme based on the mixture of single photon and Bell state with two way authentication. Acta Physica Sinica, 2023, 72(13): 130302. doi: 10.7498/aps.72.20221972
    [2] Zhou Xian-Tao, Jiang Ying-Hua. Quantum secure direct communication scheme with identity authentication. Acta Physica Sinica, 2023, 72(2): 020302. doi: 10.7498/aps.72.20221684
    [3] Shan Ming-Guang, Liu Xiang-Yu, Pang Cheng, Zhong Zhi, Yu Lei, Liu Bin, Liu Lei. Off-axis digital holographic decarrier phase recovery algorithm combined with linear regression. Acta Physica Sinica, 2022, 71(4): 044202. doi: 10.7498/aps.71.20211509
    [4] Wu Di, Jiang Zi-Zhen, Yu Huan-Huan, Zhang Chen-Shuang, Zhang Jiao, Lin Dan-Ying, Yu Bin, Qu Jun-Le. Quantitative phase microscopy imaging based on fractional spiral phase plate. Acta Physica Sinica, 2021, 70(15): 158702. doi: 10.7498/aps.70.20201884
    [5] Zhou Jing, Zhang Xiao-Fang, Zhao Yan-Geng. Phase retrieval wavefront sensing based on image fusion and convolutional neural network. Acta Physica Sinica, 2021, 70(5): 054201. doi: 10.7498/aps.70.20201362
    [6] He Wen-Qi, Chen Jia-Yu, Zhang Lian-Bin, Lu Da-Jiang, Liao Mei-Hua, Peng Xiang. Optical Hash function based on multiple scattering media. Acta Physica Sinica, 2021, 70(5): 054203. doi: 10.7498/aps.70.20201492
    [7] Precise phase retrieval with carrier removal from single off-axis hologram by linear regression. Acta Physica Sinica, 2021, (): . doi: 10.7498/aps.70.20211509
    [8] Ge Yin-Juan, Pan Xing-Chen, Liu Cheng, Zhu Jian-Qiang. Technique of detecting optical components based on coherent modulation imaging. Acta Physica Sinica, 2020, 69(17): 174202. doi: 10.7498/aps.69.20200224
    [9] Pan Xue-Mei, Meng Xiang-Feng, Yang Xiu-Lun, Wang Yu-Rong, Peng Xiang, He Wen-Qi, Dong Guo-Yan, Chen Hong-Yi. Asymetric multiple-image authentication based on complex amplitude information multiplexing and RSA algorithm. Acta Physica Sinica, 2015, 64(11): 110701. doi: 10.7498/aps.64.110701
    [10] Zhang Pei, Zhou Xiao-Qing, Li Zhi-Wei. Identification scheme based on quantum teleportation for wireless communication networks. Acta Physica Sinica, 2014, 63(13): 130301. doi: 10.7498/aps.63.130301
    [11] Wu Gui-Tong, Zhou Nan-Run, Gong Li-Hua, Liu San-Qiu. Quantum dialogue protocols with identification over collection noisy channel without information leakage. Acta Physica Sinica, 2014, 63(6): 060302. doi: 10.7498/aps.63.060302
    [12] Liu Hong-Zhan, Ji Yue-Feng. An ameliorated fast phase retrieval iterative algorithm based on the angular spectrum theory. Acta Physica Sinica, 2013, 62(11): 114203. doi: 10.7498/aps.62.114203
    [13] Yang Zhen-Ya, Zheng Chu-Jun. Phase retrieval of pure phase object based on compressed sensing. Acta Physica Sinica, 2013, 62(10): 104203. doi: 10.7498/aps.62.104203
    [14] He Wen-Qi, Peng Xiang, Meng Xiang-Feng, Liu Xiao-Li. Multi-level authentication based on two-beam interference. Acta Physica Sinica, 2013, 62(6): 064205. doi: 10.7498/aps.62.064205
    [15] Wu Rong, Hua Neng, Zhang Xiao-Bo, Cao Guo-Wei, Zhao Dong-Feng, Zhou Shen-Lei. Large-diameter multi-level diffractive optical elements with high energy efficiency. Acta Physica Sinica, 2012, 61(22): 224202. doi: 10.7498/aps.61.224202
    [16] Shi Yi-Shi, Wang Ya-Li, Yang Yu-Hua, Xiao Jun. Research on the algorithm of three-dimensional information encryption based on the phase extraction. Acta Physica Sinica, 2011, 60(3): 034202. doi: 10.7498/aps.60.034202
    [17] Peng Xiang, Tang Hong-Qiao, Tian Jin-Dong. Ciphertext-only attack on double random phase encoding optical encryption system. Acta Physica Sinica, 2007, 56(5): 2629-2636. doi: 10.7498/aps.56.2629
    [18] Huang Yan-Ping, Qi Chun-Yuan. Measurement of refractive index profile of holey fiber using quantitative phase tomography. Acta Physica Sinica, 2006, 55(12): 6395-6398. doi: 10.7498/aps.55.6395
    [19] Peng Xiang, Zhang Peng, Wei Heng-Zheng, Yu Bin. Known-plaintext attack on double phase encoding encryption technique. Acta Physica Sinica, 2006, 55(3): 1130-1136. doi: 10.7498/aps.55.1130
    [20] Yu Bin, Peng Xiang, Tian Jin-Dong, Niu Han-Ben. Phase retrieval for hard x-ray in-line phase contrast imaging. Acta Physica Sinica, 2005, 54(5): 2034-2037. doi: 10.7498/aps.54.2034
Metrics
  • Abstract views:  5040
  • PDF Downloads:  192
  • Cited By: 0
Publishing process
  • Received Date:  07 September 2016
  • Accepted Date:  28 November 2016
  • Published Online:  05 February 2017

/

返回文章
返回