Abstract

The compression of the ciphertext of a cryptosystem is desirable considering the dramatic increase in secure data transfer via Internet. In this paper, we propose a simple and universal scheme to compress and decompress the ciphertext of an optical cryptosystem by the aid of deep learning (DL). For compression, the ciphertext is first resized to a relatively small dimension by bilinear interpolation and thereafter condensed by the JPEG2000 standard. For decompression, a well-trained deep neural network (DNN) can be employed to perfectly recover the original ciphertext, in spite of the severe information loss suffered by the compressed file. In contrast with JPEG2000 and JPEG, our proposal can achieve a far smaller size of the compressed file (SCF) while offering comparable decompression quality. In addition, the SCF can be further reduced by compromising the quality of the recovered plaintext. It is also shown that the compression procedure can provide an additional security level, and this may offer new insight into the compressive encryption in optical cryptosystems. Both simulation and experimental results are presented to demonstrate the proposal.

Highlights

  • O PTICAL security methods have received increasing interest since the pioneering work of double random phase encoding was reported by Javidi and Refregier in 1995 [1]

  • The first step reduces the size of the ciphertext mask (CM) from N × N to M × M (M < N ) by bilinear interpolation, and the second step further compress it with the JPEG2000 standard

  • As the currently available spatial light modulator (SLM) is incapable of modulating the amplitude and phase simultaneously, we translate the complex amplitude behind the key mask (KM) into a phase-only wavefront (POW) by discarding the amplitude information

Read more

Summary

INTRODUCTION

O PTICAL security methods have received increasing interest since the pioneering work of double random phase encoding was reported by Javidi and Refregier in 1995 [1]. Situ and Zhang proposed wavelength multiplexing [13] and distance multiplexing [14] in the double random phase encoding scheme, Rueda et al showed the feasibility of lateral shift multiplexing [15] and key rotation multiplexing [16] in the joint transform correlator encrypting architecture, Barrera et al demonstrated the potential of multiplexing in securing movies [17]. In these multiplexing strategies, multiple ciphertexts associating with different plaintexts are directly superposed to yield the synthetic ciphertext. Both simulations and experimental results are presented to support the proposal

PRINCIPLE
The Proposal
Data Preparation
Training
Feasibility of the Proposal
THREE METHODS
Security Analysis
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.