OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: James C. Wyant
  • Vol. 46, Iss. 31 — Nov. 1, 2007
  • pp: 7662–7669

Experimental demonstration of kinogram-based single-phase decryption technique for information security

Tien Viet Vu, Nam Kim, Jun-Won An, and Sung-Back Hong  »View Author Affiliations

Applied Optics, Vol. 46, Issue 31, pp. 7662-7669 (2007)

View Full Text Article

Enhanced HTML    Acrobat PDF (1351 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



The kinogram-based single-phase decryption technique is experimentally demonstrated. Only one phase spatial light modulator is used to simultaneously display the encrypted information and the decrypting key. The intensity decrypted image is obtained by Fourier transforming the phase decrypted information. We investigate the effect of the binary and multiphase keys on the security level of the encrypted information. The accepted displacement of the decrypting key within the system is determined. The influence of the optical system bandwidth and noise on the decryption quality is also investigated.

© 2007 Optical Society of America

OCIS Codes
(070.2580) Fourier optics and signal processing : Paraxial wave optics
(100.1390) Image processing : Binary phase-only filters
(100.5090) Image processing : Phase-only filters
(230.6120) Optical devices : Spatial light modulators

ToC Category:
Image Processing

Original Manuscript: May 23, 2007
Revised Manuscript: August 10, 2007
Manuscript Accepted: August 13, 2007
Published: October 25, 2007

Tien Viet Vu, Nam Kim, Jun-Won An, and Sung-Back Hong, "Experimental demonstration of kinogram-based single-phase decryption technique for information security," Appl. Opt. 46, 7662-7669 (2007)

Sort:  Year  |  Journal  |  Reset  


  1. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). [CrossRef] [PubMed]
  2. H.-G. Yang and E.-S. Kim, "Practical image encryption scheme by real-valued data," Opt. Eng. 35, 2473-2478 (1996). [CrossRef]
  3. X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, "Secure optical storage that uses fully phase encryption," Appl. Opt. 39, 6689-6694 (2000). [CrossRef]
  4. J.-S. Yoon and N. Kim, "Triple encryption packaging scheme for preserving from the reproduction and protecting the information," Jpn. J. Appl. Phys. Part 2 41, L305-L306 (2002). [CrossRef]
  5. J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999). [CrossRef]
  6. P. C. Mogensen and J. Gluckstad, "A phase-based optical encryption system with polarization encoding," Opt. Commun. 173, 177-183 (2000). [CrossRef]
  7. O. Matoba and B. Javidi, "Secure holographic memory by double-random polarization encryption," Appl. Opt. 43, 2915-2919 (2004). [CrossRef] [PubMed]
  8. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29, 1584-1586 (2004). [CrossRef] [PubMed]
  9. P. C. Mogensen and J. Gluckstad, "Phase-only optical encryption," Opt. Lett. 25, 566-568 (2000). [CrossRef]
  10. P. C. Mogensen and J. Gluckstad, "Phase-only optical encryption of a fixed mask," Appl. Opt. 40, 1226-1235 (2001). [CrossRef]
  11. G. Situ and J. Zhang, "A lensless optical security system based on computer-generated phase only masks," Opt. Commun. 232, 115-122 (2004). [CrossRef]
  12. H. T. Chang, W. C. Lu, and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt. 41, 4815-4834 (2002). [CrossRef]
  13. Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39, 5295-5301 (2000). [CrossRef]
  14. T. V. Vu, N. Kim, and C.-S. Nam, "Simple phase-only optical decryption with misalignment-free input," Opt. Lett. 32, 223-225 (2007). [CrossRef] [PubMed]
  15. G. Zhou, Y. Chen, Z. Wang, and H. Song, "Genetic local search algorithm for optimization design of diffractive optical elements," Appl. Opt. 38, 4281-4290 (1999). [CrossRef]
  16. S. Kirpatrick, C. D. Gelatt, and M. P. Vecchi, "Optimization by simulated annealing," Science 220, 671-679 (1983). [CrossRef]
  17. M. A. Seldowitz, J. P. Allebach, and D. W. Sweeney, "Synthesis of digital holograms by direct binary search," Appl. Opt. 26, 2788-2798 (1987). [CrossRef] [PubMed]
  18. S. Sinzinger and J. Jahns, "Iterative design techniques for DOEs," in Microoptics, S.Sinzinger, ed. (Wiley-VCH, 2003), 2nd ed., pp. 168-169.
  19. M. Yamazaki and J. Ohtsubo, "Optimization of encrypted holograms in optical security systems," Opt. Eng. 40, 132-137 (2001). [CrossRef]
  20. G. Milewski, D. Engstrom, and J. Bengtsson, "Diffractive optical elements designed for highly precise far-field generation in the presence of artifacts typical for pixelated spatial light modulators," Appl. Opt. 46, 95-105 (2007). [CrossRef]
  21. J. Gluckstad, V. R. Daria, and P. J. Rodrigo, "Comment on 'Interferometric phase-only optical encryption system that uses a reference wave,"'Opt. Lett. 28, 1075-1076 (2003). [CrossRef] [PubMed]
  22. J. W. Goodman, "Wave-optics analysis of coherent optical systems," in Introduction to Fourier Optics, L. Cox and J. M. Morriss, eds. (McGraw-Hill, 1996), pp. 105-106.
  23. D.-H. Seo and S.-J. Kim, "Interferometric phase-only optical encryption system that uses a reference wave," Opt. Lett. 28, 304-306 (2003). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited