TY - JOUR
T1 - Fast numerical generation and hybrid encryption of a computer-generated Fresnel holographic video sequence
AU - Tsang, Peter
AU - Cheung, K. W K
AU - Poon, T.-C.
PY - 2013/2
Y1 - 2013/2
N2 - Research demonstrates that a Fresnel hologram can be generated and simultaneously encrypted numerically based on a secret symmetric key formed by the maximal length sequence (M-sequence). The method can be directly extended to encrypt a video holographic clip in a frame-by-frame manner. However, given the limited combination of signals in the family of M-sequence, hacking the secret key through trial and error can be time consuming but not difficult. In this letter, we propose a method that is difficult to crack with brute force for encrypting a holographic video sequence. An M-sequence is first randomly assigned to encrypt each frame of the holographic video signal. Subsequently, the index of the selected M-sequence, which is necessary to decrypt the hologram, is encrypted with the RSA algorithm before transmitting to the receiving end. At the receiving end, the decoder is provided with a private key to recover the index for each frame, and the corresponding M-sequence is used to decrypt the encoded hologram. © 2013 Chinese Optics Letters.
AB - Research demonstrates that a Fresnel hologram can be generated and simultaneously encrypted numerically based on a secret symmetric key formed by the maximal length sequence (M-sequence). The method can be directly extended to encrypt a video holographic clip in a frame-by-frame manner. However, given the limited combination of signals in the family of M-sequence, hacking the secret key through trial and error can be time consuming but not difficult. In this letter, we propose a method that is difficult to crack with brute force for encrypting a holographic video sequence. An M-sequence is first randomly assigned to encrypt each frame of the holographic video signal. Subsequently, the index of the selected M-sequence, which is necessary to decrypt the hologram, is encrypted with the RSA algorithm before transmitting to the receiving end. At the receiving end, the decoder is provided with a private key to recover the index for each frame, and the corresponding M-sequence is used to decrypt the encoded hologram. © 2013 Chinese Optics Letters.
UR - http://www.scopus.com/inward/record.url?scp=84875944802&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-84875944802&origin=recordpage
U2 - 10.3788/COL201311.020901
DO - 10.3788/COL201311.020901
M3 - RGC 21 - Publication in refereed journal
SN - 1671-7694
VL - 11
JO - Chinese Optics Letters
JF - Chinese Optics Letters
IS - 2
M1 - 20901
ER -