Font Size: a A A

Multidimensional Data Encryption And Digital Watermarking Based On Information Optics

Posted on:2007-01-16Degree:DoctorType:Dissertation
Country:ChinaCandidate:P ZhangFull Text:PDF
GTID:1118360212470872Subject:Measuring and Testing Technology and Instruments
Abstract/Summary:PDF Full Text Request
Optical encryption and watermarking techniques are emerging as the next generation technology of information security. We are now carrying out several research projects supported by the National Natural Science Foundation of China (Grant No. 60472107), the NLPR, Chinese Academy of Science through an"Opening Research Project", the Natural Science Foundation of Guangdong Province (Grant No. 04300862), and the Science and Technology Bureau of Shenzhen (Grant No. 200426). Several important issues in multidimensional data encryption and digital watermarking based on information optics will be addressed in this dissertation. The main contributions include following aspects:1. The concept of"virtual optics (VO)"is explained. In VO based approach, one is able to construct cryptographic algorithms according to optical principle whereas the algorithm is implemented in a cyberspace. Under the framework of virtual optics we study the design principles, the procedure of encryption and decryption, and multidimensional key(s) generation of the two cryptographic algorithms based on virtual optical imaging (VOI) and virtual optical holography (VOH), respectively.2. A VO-based approach of high-efficiency implementation of data security with the aid of parallel hardware and parallel software strategy (PHPS) is presented. With such an implementation scheme, we make use of a high performance floating-point Digital Signal Processor (DSP) to accomplish a design of multiple-locks and multiple-keys multimedia data encryption system. This scheme balances the advantages of high security strength in the methodology of optical data processor and the high flexibility in the methodology of electronic data processor.3. Security analysis of VOI based and VOH based cryptosystems is presented. The cryptographic properties of VO based cryptosystems, such as computational complexity, key space, confusion and diffusion, avalanche effect, nonlinearity, feasibility of VLSI implementation, weak keys and the trapdoor, are explored and discussed in detail. The strategy of security analysis proposed here could be further extended to other relevant optical security technology.4. A VO based security system model incorporation with public-key-infrastructure (PKI) techniques is exploited. The proposed model employs a hybrid architecture in which a symmetric encryption algorithm based on virtual-optics is used to...
Keywords/Search Tags:information optics, optical information security, virtual optics, data encryption, digital watermarking
PDF Full Text Request
Related items