Haofan Huang, Qi Zhao, Huanhao Li, Yuandong Zheng, Zhipeng Yu, Tianting Zhong, Shengfu Cheng, Chi Man Woo, Yi Gao, Honglin Liu, Yuanjin Zheng, Jie Tian, Puxiang Lai
{"title":"DeepSLM:通过深度对抗学习进行斑点许可调制,实现授权光学加密和解密","authors":"Haofan Huang, Qi Zhao, Huanhao Li, Yuandong Zheng, Zhipeng Yu, Tianting Zhong, Shengfu Cheng, Chi Man Woo, Yi Gao, Honglin Liu, Yuanjin Zheng, Jie Tian, Puxiang Lai","doi":"10.1002/aisy.202400150","DOIUrl":null,"url":null,"abstract":"<p>Optical encryption is pivotal in information security, offering parallel processing, speed, and robust security. The simplicity and compatibility of speckle-based cryptosystems have garnered considerable attention. Yet, the predictable statistical distribution of speckle optical fields’ characteristics can invite statistical attacks, undermining these encryption methods. The proposed solution, a deep adversarial learning-based speckle modulation network (DeepSLM), disrupts the strong intercorrelation of speckle grains. Utilizing the unique encoding properties of speckle patterns, DeepSLM facilitates license editing within the modulation phase, pioneering a layered authentication encryption system. Our empirical studies confirm DeepSLM's superior performance on key metrics. Notably, the testing dataset reveals an average Pearson correlation coefficient above 0.97 between decrypted images and their original counterparts for intricate subjects like human faces, attesting to the method's high fidelity. This innovation marries adjustable modification, optical encryption, and deep learning to enforce tiered data access control, charting new paths for creating user-specific access protocols.</p>","PeriodicalId":93858,"journal":{"name":"Advanced intelligent systems (Weinheim an der Bergstrasse, Germany)","volume":"6 11","pages":""},"PeriodicalIF":6.8000,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/aisy.202400150","citationCount":"0","resultStr":"{\"title\":\"DeepSLM: Speckle-Licensed Modulation via Deep Adversarial Learning for Authorized Optical Encryption and Decryption\",\"authors\":\"Haofan Huang, Qi Zhao, Huanhao Li, Yuandong Zheng, Zhipeng Yu, Tianting Zhong, Shengfu Cheng, Chi Man Woo, Yi Gao, Honglin Liu, Yuanjin Zheng, Jie Tian, Puxiang Lai\",\"doi\":\"10.1002/aisy.202400150\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Optical encryption is pivotal in information security, offering parallel processing, speed, and robust security. The simplicity and compatibility of speckle-based cryptosystems have garnered considerable attention. Yet, the predictable statistical distribution of speckle optical fields’ characteristics can invite statistical attacks, undermining these encryption methods. The proposed solution, a deep adversarial learning-based speckle modulation network (DeepSLM), disrupts the strong intercorrelation of speckle grains. Utilizing the unique encoding properties of speckle patterns, DeepSLM facilitates license editing within the modulation phase, pioneering a layered authentication encryption system. Our empirical studies confirm DeepSLM's superior performance on key metrics. Notably, the testing dataset reveals an average Pearson correlation coefficient above 0.97 between decrypted images and their original counterparts for intricate subjects like human faces, attesting to the method's high fidelity. This innovation marries adjustable modification, optical encryption, and deep learning to enforce tiered data access control, charting new paths for creating user-specific access protocols.</p>\",\"PeriodicalId\":93858,\"journal\":{\"name\":\"Advanced intelligent systems (Weinheim an der Bergstrasse, Germany)\",\"volume\":\"6 11\",\"pages\":\"\"},\"PeriodicalIF\":6.8000,\"publicationDate\":\"2024-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1002/aisy.202400150\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advanced intelligent systems (Weinheim an der Bergstrasse, Germany)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/aisy.202400150\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advanced intelligent systems (Weinheim an der Bergstrasse, Germany)","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/aisy.202400150","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
DeepSLM: Speckle-Licensed Modulation via Deep Adversarial Learning for Authorized Optical Encryption and Decryption
Optical encryption is pivotal in information security, offering parallel processing, speed, and robust security. The simplicity and compatibility of speckle-based cryptosystems have garnered considerable attention. Yet, the predictable statistical distribution of speckle optical fields’ characteristics can invite statistical attacks, undermining these encryption methods. The proposed solution, a deep adversarial learning-based speckle modulation network (DeepSLM), disrupts the strong intercorrelation of speckle grains. Utilizing the unique encoding properties of speckle patterns, DeepSLM facilitates license editing within the modulation phase, pioneering a layered authentication encryption system. Our empirical studies confirm DeepSLM's superior performance on key metrics. Notably, the testing dataset reveals an average Pearson correlation coefficient above 0.97 between decrypted images and their original counterparts for intricate subjects like human faces, attesting to the method's high fidelity. This innovation marries adjustable modification, optical encryption, and deep learning to enforce tiered data access control, charting new paths for creating user-specific access protocols.