OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 50, Iss. 13 — May. 1, 2011
  • pp: 1805–1811

Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator

Pramod Kumar, Joby Joseph, and Kehar Singh  »View Author Affiliations


Applied Optics, Vol. 50, Issue 13, pp. 1805-1811 (2011)
http://dx.doi.org/10.1364/AO.50.001805


View Full Text Article

Enhanced HTML    Acrobat PDF (1503 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

Interference-based optical encryption schemes have an inherent silhouette problem due to the equipollent nature of the phase-only masks (POMs) generated using an analytical method. One of the earlier methods suggested that removing the problem by use of exchanging process between two masks increases the computational load. This shortcoming is overcome with a noniterative method using the jigsaw transformation (JT) in a single step, with improved security because the inverse JT of these masks, along with correct permutation keys that are necessary to decrypt the original image. The stringent alignment requirement of the POMs in two different arms during the experiment is removed with an alternative method using a single spatial light modulator. Experimental results are provided to demonstrate the decryption process with the proposed method.

© 2011 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(070.4560) Fourier optics and signal processing : Data processing by optical means
(100.0100) Image processing : Image processing
(200.3050) Optics in computing : Information processing
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Image Processing

History
Original Manuscript: August 25, 2010
Revised Manuscript: December 24, 2010
Manuscript Accepted: December 28, 2010
Published: April 20, 2011

Citation
Pramod Kumar, Joby Joseph, and Kehar Singh, "Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator," Appl. Opt. 50, 1805-1811 (2011)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-50-13-1805


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. B.Javidi, ed., Optical and Digital Techniques for Information Security (Springer-Verlag, 2005). [CrossRef]
  2. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009). [CrossRef]
  3. O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009). [CrossRef]
  4. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  5. N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using fractional Fourier transform,” Opt. Eng. 42, 1583–1588 (2003). [CrossRef]
  6. P. Kumar, J. Joseph, and K. Singh, “Double random phase encryption with in-plane rotation of a modified Lohmann’s second-type system in the anamorphic fractional Fourier domain,” Opt. Eng. 47, 117001 (2008). [CrossRef]
  7. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef] [PubMed]
  8. R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996). [CrossRef]
  9. G. Situ and J. Zhang, “A lenseless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004). [CrossRef]
  10. H-E. Hwang, H. T. Chang, and W-N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009). [CrossRef] [PubMed]
  11. X-F. Meng, L-Z. Cai, X-L. Yang, X-X. Shen, and G-Y. Dong., “Information security system by iterative multiple-phase retrieval and pixel random-permutation,” Appl. Opt. 45, 3289–3297 (2006). [CrossRef] [PubMed]
  12. H-E. Hwang and P. Han, “Fast algorithm of phase masks for image encryption in the Fresnel domain,” J. Opt. Soc. Am. A 23, 1870–1874 (2006). [CrossRef]
  13. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef] [PubMed]
  14. B. Wang and Y. Zhang, “Double images hiding based on optics interference,” Proc. SPIE 7512, 751207 (2009). [CrossRef]
  15. B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282, 3439–3443 (2009). [CrossRef]
  16. N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13428 (2009). [CrossRef] [PubMed]
  17. Y. Han and Y. Zhang, “Optical image encryption based on two beams’ interference,” Opt. Commun. 283, 1690–1692(2010). [CrossRef]
  18. C-H. Niu, X-L. Wang, N-G. Lv, Z-H. Zhou, and X-Y. Li, “An encryption method with multiple encrypted keys based on interference principle,” Opt. Express 18, 7827–7834 (2010). [CrossRef] [PubMed]
  19. C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010). [CrossRef]
  20. W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009). [CrossRef]
  21. Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009). [CrossRef]
  22. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption based on interference under convergent random illumination,” J. Opt. 12, 095402 (2010). [CrossRef]
  23. N. Zhu, Y. Wang, J. Liu, and J. Xie, “Holographic projection based on interference and analytical algorithm,” Opt. Commun. 283, 4969–4971 (2010), [CrossRef]
  24. B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003). [CrossRef] [PubMed]
  25. N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized fractional Fourier transform,” Opt. Eng. 42, 3566–3571 (2003). [CrossRef]
  26. B. M. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier transform,” Optik (Jena) 114, 251–265(2003). [CrossRef]
  27. B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw transform in the Fresnel domain,” Opt. Eng. 43, 2239–2249 (2004). [CrossRef]
  28. B. M. Hennelly and J. T. Sheridan, “Optical encryption and the space bandwidth product,” Opt. Commun. 247, 291–305(2005). [CrossRef]
  29. J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, “Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493–499(2005). [CrossRef]
  30. Y-R. Piao, D-H. Shin, and E-S. Kim, “Robust image encryption by combined use of integral imaging and pixel scrambling techniques,” Opt. Lasers Eng. 47, 1273–1281 (2009). [CrossRef]
  31. Y-Y. Wang, Y-R. Wang, Y. Wang, H-J. Li, and W-J. Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology,” Opt. Lasers Eng. 45, 761–765 (2007). [CrossRef]
  32. X-F. Meng, L-H. Cai, X-F. Xu, S-L. Yang, X-X. Shen, G-Y. Dong, and H. Zhang, “Full-phase image encryption by two-step phase-shifting interferometry,” Optik (Jena) 119, 434–440(2008). [CrossRef]
  33. L. Chen, D. Zhao, and F. Ge., “Gray images embedded in a color image and encrypted with FRFT and Region shift encoding methods,” Opt. Commun. 283, 2043–2049 (2010). [CrossRef]
  34. Z. Liu, Q. Li, J. Dai, X. Zhao, Z. Sun, S. Liu, and M. A. Ahmad, “Image encryption based on random scrambling of the amplitude and phase in the frequency domain,” Opt. Eng. 48, 087005 (2009). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited