Identity Authentication Based on Two-Beam Interference

Abstract

A two-factor identity authentication method on the basis of two-beam interference was presented. While verifying a user’s identity, a specific “phase key” as well as a corresponding “phase lock” are both mandatory required for a successful authentication. Note that this scheme can not only check the legality of the users, but also verify their identity levels so as to grant them hierarchical access permissions to various resources of the protected systems or organizations. The authentication process is straightforward and could be implemented by a hybrid optic-electrical system. However, the system designing procedure involves an iterative Modified Phase Retrieval Algorithm (MPRA) and can only be achieved by digital means. Theoretical analysis and simulations both validate the effectiveness of our method.

Share and Cite:

He, W. and Peng, X. (2014) Identity Authentication Based on Two-Beam Interference. Journal of Computer and Communications, 2, 31-38. doi: 10.4236/jcc.2014.24005.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Refregier, P. and Javidi, B. (1995) Optical Image Encryption Based on Input Plane and Fourier Plane Random Encoding. Optics Letters, 20, 767-769. http://dx.doi.org/10.1364/OL.20.000767
[2] Liu, S.T., Mi, Q.L. and Zhu, B.H. (2001) Optical Image Encryption with Multistage and Multichannel Fractional Fourier-Domain Filtering. Optics Letters, 26, 1242-1244. http://dx.doi.org/10.1364/OL.26.001242
[3] Mogensen, P.C., Eriksen, R.L. and Gluckstad, J. (2001) High Capacity Optical Encryption System Using Ferro-Electric Spatial Light Modulators. Journal of Optics A: Pure and Applied Optics, 3, 10-15. http://dx.doi.org/10.1088/1464-4258/3/1/302
[4] Peng, X., Cui, Z.Y. and Tan, T.N. (2002) Information Encryption with Virtual-Optics Imaging System. Optics Communications, 212, 235-245. http://dx.doi.org/10.1016/S0030-4018(02)02003-5
[5] Situ, G.H. and Zhang, J. (2004) Double Random-Phase Encoding in the Fresnel Domain. Optics Letters, 29, 1584- 1586. http://dx.doi.org/10.1364/OL.29.001584
[6] Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R. and Bolognini, N. (2006) Multiplexing Encrypted Data by Using Polarized Light. Optics Communications, 260, 109-112. http://dx.doi.org/10.1016/j.optcom.2005.10.053
[7] Chen, L.F. and Zhao, D.M. (2006) Optical Image Encryption with Hartley Transforms. Optics Letters, 31, 3438-3440. http://dx.doi.org/10.1364/OL.31.003438
[8] Zhou, N., Wang, Y. and Gong, L. (2011) Novel Optical Image Encryption Scheme Based on Fractional Mellin Transform. Optics Communications, 284, 3234-3242. http://dx.doi.org/10.1016/j.optcom.2011.02.065
[9] He, W.Q., Peng, X., Qin, W. and Meng, X.F. (2010) The Keyed Optical Hash Function Based on Cascaded Phase- Truncated Fourier Transforms. Optics Communications, 283, 2328-2332. http://dx.doi.org/10.1016/j.optcom.2009.11.060
[10] Carnicer, A., Montes-Usategui, M., Arcos, S. and Juvells, I. (2005) Vulnerability to Chosen-Ciphertext Attacks of Optical Encryption Schemes Based on Double Random Phase Keys. Optics Letters, 30, 1644-1646. http://dx.doi.org/10.1364/OL.30.001644
[11] Peng, X., Wei, H.Z. and Zhang, P. (2006) Known-Plaintext Attack on Optical Encryption Based on Double Random Phase Keys. Optics Letters, 31, 1044-1046. http://dx.doi.org/10.1364/OL.31.001044
[12] Frauel, Y., Castro, A., Naughton, T.J. and Javidi, B. (2007) Resistance of the Double Random Phase Encryption against Various Attacks. Optics Express, 15, 10253-10265. http://dx.doi.org/10.1364/OE.15.010253
[13] Situ, G., Gopinathan, U., Monaghan, D.S. and Sheridan, J.T. (2007) Cryptanalysis of Optical Security Systems with Significant Output Images. Applied Optics, 46, 5257-5262. http://dx.doi.org/10.1364/AO.46.005257
[14] Tashima, H., Takeda, M., Suzuki, H., Obi, T., Yamaguchi, M. and Ohyama, N. (2010) Known Plaintext Attack on Double Random Phase Encoding Using Fingerprint as Key and a Method for Avoiding the Attack. Optics Express, 18, 13772-13781. http://dx.doi.org/10.1364/OE.18.013772
[15] Meng, X.F., Cai, L.Z. and Wang, Y.R. (2007) Hierarchical Image Encryption Based on Cascaded Iterative Phase Retrieval Algorithm in the Fresnel Domain. Journal of Optics A: Pure and Applied Optics, 9, 1070-1075. http://dx.doi.org/10.1088/1464-4258/9/11/017
[16] Zhang, Y. and Wang, B. (2008) Optical Image Encryption Based on Interference. Optics Letters, 33, 2443-2445. http://dx.doi.org/10.1364/OL.33.002443
[17] Wang, B. and Zhang, Y. (2009) Double Images Hiding Based on Optical Interference. Optics Communications, 282, 3439-3443. http://dx.doi.org/10.1016/j.optcom.2009.05.050
[18] Zhu, N., Wang, Y.T., Liu, J., Xie, J.H. and Zhang, H. (2009) Optical Image Encryption Based on Interference of Polarized Light. Optics Express, 17, 13418-13424. http://dx.doi.org/10.1364/OE.17.013418
[19] Han, Y.J. and Zhang, Y.H. (2010) Optical Image Encryption Based on Two Beams’ Interference. Optics Communications, 283, 1690-1692. http://dx.doi.org/10.1016/j.optcom.2009.12.060
[20] Tay, C.J., Quan, C., Chen, W. and Fu, Y. (2010) Color Image Encryption Based on Interference and Virtual Optics. Optics & Laser Technology, 42, 409-415. http://dx.doi.org/10.1016/j.optlastec.2009.08.016
[21] Kumar, P., Joseph, J. and Singh, K. (2011) Optical Image Encryption Using a Jigsaw Transform for Silhouette Removal in Interference-Based Methods and Decryption with a Single Spatial Light Modulator. Applied Optics, 50, 1805- 1811. http://dx.doi.org/10.1364/AO.50.001805
[22] Weng, D.D., Zhu, N., Wang, Y.T., Xie, J.H. and Liu, J.A. (2011) Experimental Verification of Optical Image Encryption Based on Interference. Optics Communications, 284, 2485-2487. http://dx.doi.org/10.1016/j.optcom.2011.01.039
[23] Yang, B., Liu, Z., Wang, B., Zhang, Y. and Liu, S. (2011) Optical Stream-Cipher-Like System for Image Encryption Based on Michelson Interferometer. Optics Express, 19, 2634-2642. http://dx.doi.org/10.1364/OE.19.002634
[24] Yuan, S., Yao, S.X., Xin, Y.H. and Liu, M.T. (2011) Information Hiding Based on the Optical Interference Principle. Optics Communications, 284, 5078-5083. http://dx.doi.org/10.1016/j.optcom.2011.07.015
[25] He, W.Q., Peng, X. and Meng, X.F. (2012) Optical Mul-tiple-Image Hiding Based on Interference and Grating Modulation. Journal of Optics, 14, Article ID: 075401. http://dx.doi.org/10.1088/2040-8978/14/7/075401
[26] Schneier, B. (1996) Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd Edition, John Wiley & Sons, Hoboken.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.