Asymmetrical and Biometric Encrypted Optical Scanning Holography (ABE-OSH)

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

View graph of relations

Author(s)

Related Research Unit(s)

Detail(s)

Original languageEnglish
Article number8661649
Pages (from-to)1094-1101
Journal / PublicationIEEE Transactions on Industrial Informatics
Volume16
Issue number2
Online published6 Mar 2019
Publication statusPublished - Feb 2020

Abstract

In this article, we report an Optical Scanning Holography (OSH) system that is equipped with biometric and the asymmetrical RSA encryption. Past research works have demonstrated that either encryption alone is vulnerable to certain types of attacks if both the encrypted and source data are available. Essentially, given sufficient time and computation power, it is possible to deduce the encryption key from these two data sets. Our proposed method can be divided into 2 stages. In the first stage, biometric encryption is incorporated in the OSH system to convert the image of a physical object into a biometric encrypted hologram. In the second stage, the biometric encrypted hologram is encoded with differential pulse code modulation (DPCM), and the polarity of the DPCM data is encrypted with the RSA algorithm. Due to the cascade of these two stages, it is not possible to identify both the source and encrypted data in each stage, and use them to hack the decryption key. We have demonstrated fast capturing and encryption of physical objects with our proposed method, and shown that that when either the biometric or the RSA encryption key is missing, the hologram cannot be recovered and the reconstructed image is incomprehensible. While we have demonstrated our idea with optical scanning holography, the proposed technique is applicable to any digital holographic systems.

Research Area(s)

  • Optical Scanning Holography (OSH), biometric encrypted OSH (BE-OSH), asymmetrical and biometric encrypted OSH (ABE-OSH), Rivest–Shamir–Adleman (RSA) encryption, known plain text attack (KPA)