It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
We study the n-dimensional deconvolution lem with an impulse response function and an (additive) noise function that are both characterised by the same phase-only stochastic spectrum. In this case, it is shown that the deconvolution problem becomes well-posed and has a general solution that is both exact and unique, subject to a re-normalisation condition relating to the scale of the solution. While the phase-only spectral model considered is of limited value in general (in particular, problems arising in the fields of digital signal processing and communications engineering, specifically with regard to the retrieval of information from noise), its application to digital cryptography has potential. One of the reasons for this (as discussed in this paper), is that it provides a method of encrypting data where the diffused plaintext can be effectively embedded in a (phase-only) cipher (subject to the floating point precision used for data processing), thereby fully dissipating the statistical signature of the plaintext in the distribution of the cipher. Further, a decrypt can be generated that is computationally efficient subject to the usual cases of sender and receiver having access to identical algorithm(s) and key(s), deconvolution being equivalent to decryption in the context of the (phase-only) encryption model that is considered. For the two-dimensional case, this approach has a potential weakness in terms of a 'correlation attack' using phase retrieval algorithms and a solution to this problem is provided by introducing a (stochastic) amplitude weighting function. Prototype MATLAB functions are provided in the Appendices that accompany this paper to give readers the opportunity to repeat the computational results presented and extend them further. The functions constitute a symmetric algorithm for encrypting and decrypting full colour images in which the key(s) have been exchanged a priori. In this context, the final part of the paper considers the application of phase-only encryption for key exchange using a Threeway Pass Protocol for which a further prototype MATLAB function is provided for validation and further development of the approach by interested readers.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 Professor at the Technological University Dublin, Republic of Ireland School
2 School of Mathematics, Statistics and Computer Science, University of KwaZulu Natal, Republic South Africa