OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 48, Iss. 14 — May. 10, 2009
  • pp: 2686–2692

Multiple-image optical encryption: an improved encoding approach

Xiao Yong-Liang, Zhou Xin, Yuan Sheng, Liu Qiang, and Li Yang-Cong  »View Author Affiliations


Applied Optics, Vol. 48, Issue 14, pp. 2686-2692 (2009)
http://dx.doi.org/10.1364/AO.48.002686


View Full Text Article

Acrobat PDF (957 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

An improved encoding approach to multiple-image optical encryption based on a cascaded phase retrieval algorithm (CPRA) is proposed. The system consists of several stages of a standard 4-f correlator, in which the keys are not only the phase mask pairs produced by CPRA but also the phase distribution of the output plane of the front stage. The security and the capacity of the system are also discussed. Results indicate that the system can resist known-plaintext attack to some extent, and the encrypted capacity is considerably enhanced. Computer simulations have proved the validity of the proposed idea. The system can be implemented using a pure optical architecture.

© 2009 Optical Society of America

OCIS Codes
(070.2580) Fourier optics and signal processing : Paraxial wave optics
(070.4560) Fourier optics and signal processing : Data processing by optical means
(060.4785) Fiber optics and optical communications : Optical security and encryption
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: November 17, 2008
Revised Manuscript: April 11, 2009
Manuscript Accepted: April 15, 2009
Published: May 6, 2009

Citation
Xiao Yong-Liang, Zhou Xin, Yuan Sheng, Liu Qiang, and Li Yang-Cong, "Multiple-image optical encryption: an improved encoding approach," Appl. Opt. 48, 2686-2692 (2009)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-48-14-2686


Sort:  Author  |  Year  |  Journal  |  Reset

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).
  2. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887-889 (2000). [CrossRef]
  3. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584-1586 (2004). [CrossRef]
  4. X. Zhou, S. Yuan, S. W. Wang, and J. Xie, “Affine cryptosystem of double-random-phase encryption based on the fractional Fourier transform,” Appl. Opt. 45, 8434-8439 (2006). [CrossRef]
  5. S. Yuan, X. Zhou, M. S. Alam, X. Lu, and X. F. Li, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270-3284 (2009).
  6. B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, “Spread-space spread-spectrum technique for secure multiplexing,” Opt. Lett. 32, 1060-1062 (2007). [CrossRef]
  7. T. J. Naughton, B. M. Hennelly, and T. Dowling, “Introducing secure modes of operation for optical encryption,” J. Opt. Soc. Am. A 25, 2608-2617 (2008). [CrossRef]
  8. T. -C. Poon, T. Kim, and K. Doh, “Optical scanning cryptography for secure wireless transmission,” Appl. Opt. 42, 6496-6503 (2003). [CrossRef]
  9. K. B. Doh, K. Dobson, T.-C Poon, and P. S. Chung, “Optical image coding with a circular Dammann grating,” Appl. Opt. 48, 134-139 (2009). [CrossRef]
  10. Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295-5301 (2000). [CrossRef]
  11. H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825-4834 (2002). [CrossRef]
  12. X. Meng, L. Cai, X. Yang, X. Shen, and G. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289-3297(2006). [CrossRef]
  13. X. Meng, L. Cai, and Y. Wang, “Hierarchical optical image encryption based on cascaded phase retrieval algorithm in the Fresnel domain,” J. Opt. A: Pure Appl. Opt. 9, 1070-1075(2007).
  14. G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257-5262 (2007). [CrossRef]
  15. G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306-1308 (2005). [CrossRef]
  16. Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542-544 (2008). [CrossRef]
  17. Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32, 1914-1916(2007). [CrossRef]
  18. A. Alkholidi, A. Alfalou, and H. Haman, “A new approach for optical colored image compression using the JPEG standards,” Signal Process. 87, 569-583 (2007). [CrossRef]
  19. A. Alkholidi, A. Cottour, A. Aflalou, H. Hamam, and G. Keryer, “Real-time optical 2D wavelet transform based on the JPEG2000 standards,” Eur. Phys. J. Appl. Phys. 44, 261-272(2008).
  20. S. Soualmi, A. Alfalou, and H. Hamam, “Optical image compression based on segmentation of the Fourier plane new approaches and critical analysis,” J. Opt. A: Pure and Appl. Opt. 9, 73-80 (2007).
  21. T. J. Naughton, B. M. Hennelly, and T. Dowling, “Introducing secure modes of operation for optical encryption,” J. Opt. Soc. Am. A 25, 2608-2617 (2008).
  22. J. Rosen, “Learning in correlators based on projections onto constraint sets,” Opt. Lett. 18, 1183-1185 (1993). [CrossRef]
  23. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21, 2758-2769 (1982). [CrossRef]
  24. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044-1046 (2006). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited