A two-factor identity authentication method
on the basis of two-beam interference was presented. While verifying a user’s
identity, a specific “phase key” as well as a corresponding “phase lock” are
both mandatory required for a successful authentication. Note that this scheme
can not only check the legality of the users, but also verify their identity
levels so as to grant them hierarchical access permissions to various resources
of the protected systems or organizations. The authentication process is
straightforward and could be implemented by a hybrid optic-electrical system.
However, the system designing procedure involves an iterative Modified Phase
Retrieval Algorithm (MPRA) and can only be achieved by digital means.
Theoretical analysis and simulations both validate the effectiveness of our
Mogensen, P.C., Eriksen, R.L. and Gluckstad, J. (2001) High Capacity Optical Encryption System Using Ferro-Electric Spatial Light Modulators. Journal of Optics A: Pure and Applied Optics, 3, 10-15.
Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R. and Bolognini, N. (2006) Multiplexing Encrypted Data by Using Polarized Light. Optics Communications, 260, 109-112. http://dx.doi.org/10.1016/j.optcom.2005.10.053
He, W.Q., Peng, X., Qin, W. and Meng, X.F. (2010) The Keyed Optical Hash Function Based on Cascaded Phase- Truncated Fourier Transforms. Optics Communications, 283, 2328-2332.
Carnicer, A., Montes-Usategui, M., Arcos, S. and Juvells, I. (2005) Vulnerability to Chosen-Ciphertext Attacks of Optical Encryption Schemes Based on Double Random Phase Keys. Optics Letters, 30, 1644-1646.
Frauel, Y., Castro, A., Naughton, T.J. and Javidi, B. (2007) Resistance of the Double Random Phase Encryption against Various Attacks. Optics Express, 15, 10253-10265. http://dx.doi.org/10.1364/OE.15.010253
Tashima, H., Takeda, M., Suzuki, H., Obi, T., Yamaguchi, M. and Ohyama, N. (2010) Known Plaintext Attack on Double Random Phase Encoding Using Fingerprint as Key and a Method for Avoiding the Attack. Optics Express, 18, 13772-13781. http://dx.doi.org/10.1364/OE.18.013772
Meng, X.F., Cai, L.Z. and Wang, Y.R. (2007) Hierarchical Image Encryption Based on Cascaded Iterative Phase Retrieval Algorithm in the Fresnel Domain. Journal of Optics A: Pure and Applied Optics, 9, 1070-1075.
Tay, C.J., Quan, C., Chen, W. and Fu, Y. (2010) Color Image Encryption Based on Interference and Virtual Optics. Optics & Laser Technology, 42, 409-415. http://dx.doi.org/10.1016/j.optlastec.2009.08.016
Kumar, P., Joseph, J. and Singh, K. (2011) Optical Image Encryption Using a Jigsaw Transform for Silhouette Removal in Interference-Based Methods and Decryption with a Single Spatial Light Modulator. Applied Optics, 50, 1805- 1811. http://dx.doi.org/10.1364/AO.50.001805
Yang, B., Liu, Z., Wang, B., Zhang, Y. and Liu, S. (2011) Optical Stream-Cipher-Like System for Image Encryption Based on Michelson Interferometer. Optics Express, 19, 2634-2642. http://dx.doi.org/10.1364/OE.19.002634
Yuan, S., Yao, S.X., Xin, Y.H. and Liu, M.T. (2011) Information Hiding Based on the Optical Interference Principle. Optics Communications, 284, 5078-5083. http://dx.doi.org/10.1016/j.optcom.2011.07.015
He, W.Q., Peng, X. and Meng, X.F. (2012) Optical Mul-tiple-Image Hiding Based on Interference and Grating Modulation. Journal of Optics, 14, Article ID: 075401. http://dx.doi.org/10.1088/2040-8978/14/7/075401