Method and system for verification and authentication using optically encoded QR codes
09785789 · 2017-10-10
Assignee
Inventors
Cpc classification
H04K1/006
ELECTRICITY
G09C5/00
PHYSICS
G06F21/6218
PHYSICS
International classification
G06F21/62
PHYSICS
H04L9/32
ELECTRICITY
Abstract
An optical security method for object authentication using photon-counting encryption implemented with phase encoded QR codes. By combining the full phase double-random-phase encryption with photon-counting imaging method and applying an iterative Huffman coding technique, encryption and compression of an image containing primary information about the object is achieved. This data can then be stored inside of an optically phase-encoded QR code for robust read out, decryption, and authentication. The optically encoded QR code is verified by examining the speckle signature of the optical masks using statistical analysis.
Claims
1. A method for optical security, tagging and authentication, the method comprising the steps of: storing image data in an ID tag; generating phase encoded image data by applying phase encoding to the image data; generating encrypted image data by multiplying the phase encoded image data with a first type of phase mask that is calculated based on a predefined function; producing photon-limited amplitude image data by applying photon-counting to amplitude data of the encrypted image data; generating compressed image data by iteratively compressing the photon-limited amplitude image data; inputting the compressed image data in an optically encoded object that comprises a QR code; combining the QR code with a second type of phase mask, wherein the second type of phase mask is a physical phase mask that includes at least one of a thick phase mask or a 3D code; and verifying authenticity of the QR code by examining the QR code with the second type of phase mask.
2. The method of claim 1, wherein photon-counting includes a technique that follows the Poisson distribution.
3. The method of claim 1, wherein a synthetic, natural or physical signature is stored in an identification tag associated with the image data.
4. The method of claim 1, wherein encrypting includes full-phase double-random-phase encryption.
5. The method of claim 1, wherein compressing includes Huffman coding.
6. The method of claim 1, further comprising: scanning the QR code; verifying the QR code by examining the speckle signature generated by the second type of phase mask using statistical analysis; decompressing the compressed image data stored in the QR code, wherein decompressing the compressed image data generates a resultant encrypted image data; generating decrypted image data by decrypting the resultant encrypted image data; and authenticating the decrypted image data using a classification algorithm by verifying the decrypted image data against a primary image for authentication.
7. The method of claim 1, further comprising scanning the QR code by a QR code scanner.
8. The method of claim 1, wherein the image data is encrypted, compressed and stored in the QR code without requiring the use of the world wide web.
9. The method of claim 6, further comprising using one or more keys to decrypt the resultant encrypted image data.
10. The method of claim 6, further comprising using a nonlinear correlation filter image recognition algorithm to verify the decrypted image data against a primary image for authentication.
11. An optical security, tagging and authentication system, the system comprising: an integrated circuit configured to: contain an ID tag storing image data; generate a phase encoded image data by applying phase encoding to the image data; generate encrypted image data by multiplying the phase encoded image data with a first type of phase mask that is calculated based on a predefined function; produce photon-limited amplitude image data by applying photon-counting to amplitude data of the encrypted image data; generate compressed image data by iteratively compressing the photon-limited amplitude image data; input the compressed image data in an optically encoded object that comprises a QR code; combine the QR code with a second type of phase mask, wherein the second type of phase mask is a physical phase mask that includes at least one of a thick phase mask or a 3D code; and verify authenticity of the QR code by examining the QR code with the second type of phase mask.
12. The system of claim 11, wherein Huffman coding is used to iteratively compress the photon-limited amplitude image data.
13. The system of claim 11, further comprising a mobile device including a camera, configured to: scan the compressed image data; verify the QR code by examining the speckle signature generated by the second type of phase mask using statistical analysis; decompress the compressed image data input in the QR code, wherein decompressing the compressed image data generates a resultant encrypted image data; generate image data by decrypting the resultant encrypted image data; and authenticate the image data using a classification algorithm by verifying the decrypted image data against a primary image for authentication.
14. The system in claim 13, wherein a mobile device uses the camera to scan the QR code.
15. The system of claim 13, wherein at least one key is used to decrypt the resultant encrypted image data.
16. The system of claim 13, wherein a nonlinear correlation filter image recognition algorithm to is used to verify the image data against a primary image for authentication.
17. The method of claim 6, wherein the speckle signature is associated with surface roughness of the object to be authenticated.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1) To assist those of ordinary skill in the art in making and using the disclosed apparatus, systems and methods, reference is made to the appended figures, wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENT(S)
(17) According to the present disclosure, advantageous systems and methods for optical tagging are provided. According to exemplary systems and methods of the present disclosure, data is encrypted using a full-phase double-random-phase encryption with photon-counting, and then an iterative compression technique is applied based on Huffman coding to compress the image. The data can then be stored in a QR code and placed on the object to be authenticated. Commercial QR scanners, e.g., scanners built into Smartphones such as an iPhone or Android device, can be used to scan the QR code and capture the encrypted data. The encrypted data can then be decrypted and decompressed using the correct keys and dedicated algorithms to deal with the photon-counting nature of the data. Image recognition algorithms, such as nonlinear correlation filters, can be used to verify the decrypted image against the primary image for authentication.
(18) QR Codes
(19) A QR code is a 2 dimensional (2D) barcode created by D. Wave [33],[34]. The advantage of a QR code is that it can be scanned regardless of scanning direction or if the QR code is damaged. Online QR Code generators can be used to generate QR codes including the level of error correction and version number [41]. The QR code itself is a binary image consisting of black squares known as modules placed on a white background, shown in
(20) Full-Phase Double-Random-Phase Encoding with Photon-Counting
(21) In exemplary embodiments, the full-phase double-random-phase encryption with photon-counting (PC-DRPE) can be used to encrypt the input image. For convenience, one-dimensional notation will be used in explaining the encryption method. To implement the encryption scheme, (x) and (υ) denote the spatial and frequency domains, respectively. In addition, f (x) is the primary input image and n(x) and b(υ) are two random noises that are uniformly distributed over the interval[0,1]. The encrypted image is generated by first phase encoding the input image yielding exp[iπ f (x)] and then multiplying the phase encoded image by the phase mask exp[i2π n(x)]. This product is then convolved with a phase mask, h(x), whose Fourier transform is exp[i2π b(ν)]. The encrypted image is then denoted by equation:
ψ(x)={exp[iπf(x)]×exp[i2πn(x)]}*h(x) [1],
where * denotes convolution and × denotes multiplication.
(22) Photon-counting imaging [25]-[26],[39] is then applied to the amplitude of the encrypted image, |ψ(x)| (x), by limiting the number of photons arriving at each pixel. It has been shown that this process can be modeled as a Poisson distribution. Moreover, the fewer the number of photons, the sparser the scene becomes due to less photons arriving at a pixel. The number of photons arriving at pixel j can be modeled as:
(23)
where l.sub.j is the number of photons detected at pixel j and λ.sub.j is the Poisson parameter defined as N.sub.px.sub.j, where N.sub.p is the number of photons in the scene and x.sub.j, is the normalized irradiance at pixel j such that Σ.sup.M.sub.j=1 x.sub.j=1 with M being the total number of pixels. Moreover, the normalized irradiance is defined as |ψ.sub.ph(x)|=|ψ(x.sub.j)|/|Σ.sup.M.sub.j=1|ψ(x.sub.j)|, where |ψ(x.sub.j)| is the amplitude information.
(24) The full-phase PC-DRPE encrypted image ψ.sub.ph(x), can then be decrypted The Fourier transform of ψ.sub.ph(x) is taken and multiplied by the complex conjugate of the phase mask used in the frequency domain, exp[−i2π b(ν)]. The Fourier transform is then taken once more. In the full-phase PC-DRPE decryption process, the resulting product must be multiplied by the complex conjugate of the phase mask used in the spatial domain, exp[−i2π b(ν)]. The final decrypted image, f(x), which is real and positive, is then found as [8], [26]:
|f.sub.ph(x)|=|Arg{Aexp[iπf.sub.ph(x)]}/π| [3],
where A is the amplitude of the decrypted image, Arg is the argument function and ∥ is the modulus operator.
(25) Rather than recover the decrypted image, a noise-like decrypted image is obtained which is difficult to visually authenticate. However, the decrypted image can be authenticated using classification algorithms, such as nonlinear-processors [36]-[38]. To authenticate the decrypted image [Eq. (3)], a number of image recognition techniques can be used. For example, a k.sup.th order nonlinear processor [37] may be advantageously employed for its simplicity and effectiveness. In this approach, the Fourier transforms of the decrypted image, f.sub.ph(x), and the input image, f(x), are first taken. The processor is implemented by the following equation:
c(x)=IFT{|F.sub.f.sub.
where IFT is the inverse Fourier transform, k is the strength of the applied nonlinearity and determines the performance features of the processor, and φ(ν) is the phase information.
(26) Combining Huffman Coding with the DRPE and QR Code
(27) In exemplary embodiments, an iterative Huffman coding method to compress an image is used so it can be stored in a QR code, allowing a Smartphone to read the QR code.
(28) Currently, it is not possible to insert an image into a QR code [See Appendix A for more information about QR codes] due to data size restrictions and the limited resolution of commercial Smartphones when scanning the QR code[40]. To overcome this limitation, an image is inserted into a QR code via a hyperlink: A user scans the QR code containing the hyperlink which automatically redirects the user to the image. We present an iterative Huffman coding method to compress an image so it can be stored in a QR code allowing a Smartphone to read the QR code.
(29) In the iterative Huffman coding method, Huffman coding [32] is applied on the photon-limited amplitude data, ψ(x), for low N.sub.p [Eq. (2)] by converting the image into a 1 dimensional array. Note that each pixel is an integer value due to the Poisson distribution being a discrete distribution. The first Huffman code compression reduces the image into a series of bits. The Huffman code can then be represented as a series of integers by first padding the Huffman code with zeros to ensure the code can be separated into groups of 8 bits. Each group can then be converted to an integer; this is advantageous because the QR code is character limited.
(30) For example, if a group of 10 pixels has corresponding values [0 1 1 0 0 2 1 4 2 1] in the image, the Huffman code is then a series of bits corresponding to the symbol 0, 1, 2, or 4. Suppose a group of 8 bits is 10110111, this can be rewritten as 183. Once there has been one iteration of Huffman coding, Huffman coding can be repeated since there will be repeated integers between 1 and 256 which range from 1 to 3 characters each. The described Huffman coding procedure can be repeated until there is a low number of characters present in the compressed data.
(31) Once the QR code has been scanned, the data can be decompressed if both the dictionary and the length of the unpadded Huffman code, in bit form, associated with each Huffman iteration are known (allowing for the zero padding to be removed). Moreover, the data can then be successfully decrypted if the phase mask keys used in the full-phase PC-DRPE are known.
(32) With reference to the figures,
(33) Once the data has been scanned, it can be decompressed and decrypted. With reference to
(34) In this exemplary embodiment, replication of the QR code is avoided. More particularly, in the exemplary embodiment, replication of the QR code is prevented by optically encoding the QR code. To do this, a phase mask is pasted on the QR code and coherent optical imaging is used to verify whether the QR code has been copied.
(35) To verify that the correct phase mask is used, a laser source illuminates the QR code located on the IC chip which is covered by the phase mask. The light scatters off of the random phase mask and generates a speckle pattern which can be seen on a projection screen as shown in
(36)
(37) The speckle intensity pattern of each individual point on the QR code can be modeled as a negative exponential distribution. Thus, the camera recorded speckle intensity pattern can be modeled as a sum of independent negative exponential distributions which is a gamma distribution defined as [39],[42],[43]:
(38)
where <I> denotes the mean ensemble, I represents the speckle intensity pattern data points and n.sub.o is the number of independent correlation cells (speckles) within the scanning aperture and chosen so that the variance of the approximate and exact distributions are equal: n.sub.o=<I>.sup.2/σ.sub.b.sup.2, where σ.sub.b is the standard deviation of the intensity fluctuation relative to the mean intensity.
(39) The likelihood ratio test [44] can be used for classification between a true and false class speckle intensity pattern. Let H.sub.o be the null hypothesis representing the true class object and H.sub.1 be the alternative hypothesis representing the false class object. The log-likelihood function of Eq. (5) is:
(40)
where θ represents the distribution parameters and N is the total number of I.sub.j.
(41) The log-likelihood ratio can be written as:
(42)
where θ and θ.sub.1 represent the true and false class distribution parameters, respectively.
(43) Using the likelihood ratio test [Eq. (7)] with true and false class images shown in
(44) While the invention has been described with reference to preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for the elements thereof without departing from the scope of the invention. In addition, many modifications may be made to adapt the teaching of the invention to particular use, application, manufacturing conditions, use conditions, composition, medium, size, and/or materials without departing from the essential scope and spirit of the invention. Therefore, it is intended that the invention not be limited to the particular embodiments and best mode contemplated for carrying out this invention as described herein.